Claude Code is an agentic coding tool. Prior to version 2.0.55, Claude Code failed to properly validate commands using piped sed operations with the echo command, allowing attackers to bypass file write restrictions. This vulnerability enabled writing to sensitive directories like the .claude folder and paths outside the project scope. Exploiting this required the ability to execute commands through Claude Code with the "accept edits" feature enabled. This issue has been patched in version 2.0.55.
Metrics
Affected Vendors & Products
References
History
Fri, 06 Feb 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 06 Feb 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Claude Code is an agentic coding tool. Prior to version 2.0.55, Claude Code failed to properly validate commands using piped sed operations with the echo command, allowing attackers to bypass file write restrictions. This vulnerability enabled writing to sensitive directories like the .claude folder and paths outside the project scope. Exploiting this required the ability to execute commands through Claude Code with the "accept edits" feature enabled. This issue has been patched in version 2.0.55. | |
| Title | Claude Code Vulnerable to Command Injection via Piped sed Command Bypasses File Write Restrictions | |
| Weaknesses | CWE-20 CWE-78 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-06T18:40:54.158Z
Reserved: 2026-02-05T16:48:00.426Z
Link: CVE-2026-25723
Updated: 2026-02-06T18:40:49.688Z
Status : Received
Published: 2026-02-06T18:15:59.237
Modified: 2026-02-06T18:15:59.237
Link: CVE-2026-25723
No data.
OpenCVE Enrichment
No data.