On Windows, Claude Code loaded system-wide default configuration from C:\ProgramData\ClaudeCode\managed-settings.json without validating directory ownership or access permissions. Because the ProgramData directory is writable by non-administrative users by default and the ClaudeCode subdirectory was not pre-created or access-restricted, a low-privileged local user could create this directory and place a malicious configuration file that would be automatically loaded for any user launching Claude Code on the same machine. Exploiting this would have required a shared multi-user Windows system and a victim user to launch Claude Code after the malicious configuration was placed.
Users on standard Claude Code auto-update have received this fix already. Users performing manual updates are advised to update to the latest version.
Thank you to hackerone.com/edbr for reporting this issue.
{
"github_reviewed_at": "2026-04-17T22:19:38Z",
"nvd_published_at": "2026-04-17T21:16:33Z",
"cwe_ids": [
"CWE-426"
],
"severity": "MODERATE",
"github_reviewed": true
}