Claude Code <1.0.105: Confirm Prompt Bypass, Untrusted Cmd Exec
CVE-2025-58764 Published on September 10, 2025

Claude Code is an agentic coding tool. Due to an error in command parsing, versions prior to 1.0.105 were vulnerable to a bypass of the Claude Code confirmation prompt to trigger execution of an untrusted command. Reliably exploiting this requires the ability to add untrusted content into a Claude Code context window. Users on standard Claude Code auto-update will have received this fix automatically. Users performing manual updates are advised to update to version 1.0.105 or the latest version.

NVD

Weakness Type

What is a Code Injection Vulnerability?

The software constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.

CVE-2025-58764 has been classified to as a Code Injection vulnerability or weakness.


Products Associated with CVE-2025-58764

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2025-58764 are published in Anthropic Claude Code:

 

Affected Versions

anthropics claude-code Version < 1.0.105 is affected by CVE-2025-58764

Exploit Probability

EPSS
0.16%
Percentile
37.20%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.