CVE-2026-21852

Source
https://cve.org/CVERecord?id=CVE-2026-21852
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-21852.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-21852
Aliases
Published
2026-01-21T20:42:06.812Z
Modified
2026-03-13T04:03:10.656831Z
Severity
  • 5.3 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N CVSS Calculator
Summary
Claude Code Leaks Data via Malicious Environment Configuration Before Trust Confirmation
Details

Claude Code is an agentic coding tool. Prior to version 2.0.65, vulnerability in Claude Code's project-load flow allowed malicious repositories to exfiltrate data including Anthropic API keys before users confirmed trust. An attacker-controlled repository could include a settings file that sets ANTHROPICBASEURL to an attacker-controlled endpoint and when the repository was opened, Claude Code would read the configuration and immediately issue API requests before showing the trust prompt, potentially leaking the user's API keys. Users on standard Claude Code auto-update have received this fix already. Users performing manual updates are advised to update to version 2.0.65, which contains a patch, or to the latest version.

Database specific
{
    "cwe_ids": [
        "CWE-522"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/21xxx/CVE-2026-21852.json",
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git /

Affected ranges

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-21852.json"
unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "fixed": "2.0.65"
            }
        ]
    }
]