Vulnerability Description
Claude Code is an agentic coding tool. Prior to version 1.0.4, it's possible to bypass the Claude Code confirmation prompts to read a file and then send file contents over the network without user confirmation due to an overly broad allowlist of safe commands. Reliably exploiting this requires the ability to add untrusted content into a Claude Code context window. Users on standard Claude Code auto-update received this fix automatically after release. Current users of Claude Code are unaffected, as versions prior to 1.0.24 are deprecated and have been forced to update.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Anthropic | Claude Code | < 1.0.4 |
Related Weaknesses (CWE)
References
FAQ
What is CVE-2025-55284?
CVE-2025-55284 is a vulnerability with a CVSS score of 7.5 (HIGH). Claude Code is an agentic coding tool. Prior to version 1.0.4, it's possible to bypass the Claude Code confirmation prompts to read a file and then send file contents over the network without user con...
How severe is CVE-2025-55284?
CVE-2025-55284 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-55284?
Check the references section above for vendor advisories and patch information. Affected products include: Anthropic Claude Code.