High severityNVD Advisory· Published Feb 6, 2026· Updated Feb 6, 2026
Claude Code Vulnerable to Command Injection via Piped sed Command Bypasses File Write Restrictions
CVE-2026-25723
Description
Claude Code is an agentic coding tool. Prior to version 2.0.55, Claude Code failed to properly validate commands using piped sed operations with the echo command, allowing attackers to bypass file write restrictions. This vulnerability enabled writing to sensitive directories like the .claude folder and paths outside the project scope. Exploiting this required the ability to execute commands through Claude Code with the "accept edits" feature enabled. This issue has been patched in version 2.0.55.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
@anthropic-ai/claude-codenpm | < 2.0.55 | 2.0.55 |
Affected products
1- Range: < 2.0.55
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-mhg7-666j-cqg4ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-25723ghsaADVISORY
- github.com/anthropics/claude-code/security/advisories/GHSA-mhg7-666j-cqg4ghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.