CVE-2026-25725
moderate-risk
Published 2026-02-06
Claude Code is an agentic coding tool. Prior to version 2.1.2, Claude Code's bubblewrap sandboxing mechanism failed to properly protect the .claude/settings.json configuration file when it did not exist at startup. While the parent directory was mounted as writable and .claude/settings.local.json was explicitly protected with read-only constraints, settings.json was not protected if it was missing. This allowed malicious code running inside the sandbox to create this file and inject persistent hooks (such as SessionStart commands) that would execute with host privileges when Claude Code was restarted. This issue has been patched in version 2.1.2.
Do I need to act?
-
0.02% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
+
Fix available
Upgrade to: 553d6ffc3e2a2b719c501d56a062560c5ce23b54
10
CVSS 10.0/10
Critical
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (1)
Third Party Advisory
https://github.com/anthropics/claude-code/security/advisories/GHSA-ff64-7w26-62r...
38
/ 100
moderate-risk
Severity
33/34 · Critical
Exploitability
0/34 · Minimal
Exposure
5/34 · Minimal