GHSA-j4h9-wv2m-wrf7

Suggest an improvement
Source
https://github.com/advisories/GHSA-j4h9-wv2m-wrf7
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/09/GHSA-j4h9-wv2m-wrf7/GHSA-j4h9-wv2m-wrf7.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-j4h9-wv2m-wrf7
Aliases
Published
2025-09-10T20:29:04Z
Modified
2025-09-25T23:42:37Z
Severity
  • 8.5 (High) CVSS_V4 - CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N CVSS Calculator
Summary
Claude Code vulnerable to arbitrary code execution caused by maliciously configured git email
Details

At startup, Claude Code constructed a shell command that interpolated the value of git config user.email from the current workspace. If an attacker controlled the repository’s Git config (e.g., via a malicious .git/config) and set user.email to a crafted payload, the unescaped interpolation could trigger arbitrary command execution before the user accepted the workspace-trust dialog. The issue affects versions prior to 1.0.105. The fix in 1.0.105 avoids executing commands built from untrusted configuration and properly validates/escapes inputs.

  • Patches: Update to @anthropic-ai/claude-code 1.0.105 or later.
  • Workarounds: Open only trusted workspaces and inspect repository .git/config before launch; avoid inheriting untrusted Git configuration values.

Thank you to the NVIDIA AI Red Team for reporting this issue!

Database specific
{
    "severity": "HIGH",
    "github_reviewed": true,
    "nvd_published_at": "2025-09-10T16:15:41Z",
    "cwe_ids": [
        "CWE-78",
        "CWE-94"
    ],
    "github_reviewed_at": "2025-09-10T20:29:04Z"
}
References

Affected packages

npm / @anthropic-ai/claude-code

Package

Name
@anthropic-ai/claude-code
View open source insights on deps.dev
Purl
pkg:npm/%40anthropic-ai/claude-code

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.105

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/09/GHSA-j4h9-wv2m-wrf7/GHSA-j4h9-wv2m-wrf7.json"