CVE-2025-65099

Source
https://cve.org/CVERecord?id=CVE-2025-65099
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-65099.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-65099
Aliases
Published
2025-11-19T17:35:17.349Z
Modified
2026-03-13T03:38:35.080924Z
Severity
  • 7.7 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N CVSS Calculator
Summary
Claude Code vulnerable to command execution prior to startup trust dialog
Details

Claude Code is an agentic coding tool. Prior to version 1.0.39, when running on a machine with Yarn 3.0 or above, Claude Code could have been tricked to execute code contained in a project via yarn plugins before the user accepted the startup trust dialog. Exploiting this would have required a user to start Claude Code in an untrusted directory and to be using Yarn 3.0 or above. This issue has been patched in version 1.0.39.

Database specific
{
    "cwe_ids": [
        "CWE-94"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/65xxx/CVE-2025-65099.json",
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git /

Affected ranges

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-65099.json"
unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "fixed": "1.0.39"
            }
        ]
    }
]