High severityGHSA Advisory· Published Feb 3, 2026· Updated Feb 3, 2026
Claude Code has a Command Injection in find Command Bypasses User Approval Prompt
CVE-2026-24887
Description
Claude Code is an agentic coding tool. Prior to version 2.0.72, due to an error in command parsing, it was possible to bypass the Claude Code confirmation prompt to trigger execution of untrusted commands through the find command. Reliably exploiting this required the ability to add untrusted content into a Claude Code context window. This issue has been patched in version 2.0.72.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
@anthropic-ai/claude-codenpm | < 2.0.72 | 2.0.72 |
Affected products
1- Range: < 2.0.72
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-qgqw-h4xq-7w8wghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-24887ghsaADVISORY
- github.com/anthropics/claude-code/security/advisories/GHSA-qgqw-h4xq-7w8wghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.