Loading HuntDB...

CVE-2025-54794

UNKNOWN
Published 2025-08-05T00:08:13.864Z
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2025-54794. We'll provide specific mitigation strategies based on your environment and risk profile.

No CVSS data available

Description

Claude Code is an agentic coding tool. In versions below 0.2.111, a path validation flaw using prefix matching instead of canonical path comparison, makes it possible to bypass directory restrictions and access files outside the CWD. Successful exploitation depends on the presence of (or ability to create) a directory with the same prefix as the CWD and the ability to add untrusted content into a Claude Code context window. This is fixed in version 0.2.111.

Available Exploits

No exploits available for this CVE.

Related News

No news articles found for this CVE.

Affected Products

EU Vulnerability Database

Monitored by ENISA for EU cybersecurity

EU Coordination

EU Coordinated

Exploitation Status

No Known Exploitation

ENISA Analysis

Claude Code is an agentic coding tool. In versions below 0.2.111, a path validation flaw using prefix matching instead of canonical path comparison, makes it possible to bypass directory restrictions and access files outside the CWD. Successful exploitation depends on the presence of (or ability to create) a directory with the same prefix as the CWD and the ability to add untrusted content into a Claude Code context window. This is fixed in version 0.2.111.

Affected Products (ENISA)

anthropics
claude-code

ENISA Scoring

CVSS Score (4.0)

7.7
/10
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS Score

0.030
probability

Data provided by ENISA EU Vulnerability Database. Last updated: August 5, 2025

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

✓ GitHub Reviewed HIGH

Claude Code Research Preview has a Path Restriction Bypass which could allow unauthorized file access

GHSA-pmw4-pwvc-3hx2

Advisory Details

Due to a path validation flaw using prefix matching instead of canonical path comparison, it was possible to bypass directory restrictions and access files outside the CWD. Successful exploitation depends on the presence of (or ability to create) a directory with the same prefix as the CWD and the ability to add untrusted content into a Claude Code context window. Users on standard Claude Code auto-update received this fix automatically after release. Current users of Claude Code are unaffected, as versions prior to 1.0.24 are deprecated and have been forced to update. Thank you to Elad Beber (Cymulate) for reporting this issue!

Affected Packages

npm @anthropic-ai/claude-code
ECOSYSTEM: ≥0 <0.2.111

CVSS Scoring

CVSS Score

7.5

CVSS Vector

CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Advisory provided by GitHub Security Advisory Database. Published: August 4, 2025, Modified: August 5, 2025

Social Media Intelligence

Real-time discussions and threat intelligence from social platforms

3 posts
Reddit 2 weeks, 2 days ago
crstux
Exploit

🔥 Top 10 Trending CVEs (07/08/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2025-54948](https://nvd.nist.gov/vuln/detail/CVE-2025-54948)** - 📝 A vulnerability in Trend Micro Apex One (on-premise) management console could allow a pre-authenticated remote attacker to upload malicious code and execute commands on affected installations. - 📅 …

1
1.0
View Original High Risk
Reddit 2 weeks, 3 days ago
crstux

🔥 Top 10 Trending CVEs (06/08/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2025-54982](https://nvd.nist.gov/vuln/detail/CVE-2025-54982)** - 📝 An improper verification of cryptographic signature in Zscalers SAML authentication mechanism on the server-side allowed an authentication abuse. - 📅 **Published:** 05/08/2025 - 📈 **CVSS:** 9.6 - 🧭 …

Reddit 2 weeks, 4 days ago
crstux
Exploit Payload

🔥 Top 10 Trending CVEs (05/08/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2025-54574](https://nvd.nist.gov/vuln/detail/CVE-2025-54574)** - 📝 Squid is a caching proxy for the Web. In versions 6.3 and below, Squid is vulnerable to a heap buffer overflow and possible remote code execution attack when …

1
1.0
View Original High Risk

References

Published: 2025-08-05T00:08:13.864Z
Last Modified: 2025-08-05T00:08:13.864Z
Copied to clipboard!