GHSA-mmgp-wc2j-qcv7

Suggest an improvement
Source
https://github.com/advisories/GHSA-mmgp-wc2j-qcv7
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-mmgp-wc2j-qcv7/GHSA-mmgp-wc2j-qcv7.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-mmgp-wc2j-qcv7
Aliases
  • CVE-2026-33068
Published
2026-03-19T12:42:09Z
Modified
2026-03-20T21:33:50.318924Z
Severity
  • 7.7 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N CVSS Calculator
Summary
Claude Code has a Workspace Trust Dialog Bypass via Repo-Controlled Settings File
Details

Claude Code resolved the permission mode from settings files, including the repo-controlled .claude/settings.json, before determining whether to display the workspace trust confirmation dialog. A malicious repository could set permissions.defaultMode to bypassPermissions in its committed .claude/settings.json, causing the trust dialog to be silently skipped on first open. This allowed a user to be placed into a permissive mode without seeing the trust confirmation prompt, making it easier for an attacker-controlled repository to gain tool execution without explicit user consent.

Users on standard Claude Code auto-update have received this fix already. Users performing manual updates are advised to update to the latest version.

Thank you to hackerone.com/cantina_xyz for reporting this issue.

Database specific
{
    "cwe_ids": [
        "CWE-807"
    ],
    "github_reviewed": true,
    "nvd_published_at": "2026-03-20T09:16:15Z",
    "severity": "HIGH",
    "github_reviewed_at": "2026-03-19T12:42:09Z"
}
References

Affected packages

npm / @anthropic-ai/claude-code

Package

Name
@anthropic-ai/claude-code
View open source insights on deps.dev
Purl
pkg:npm/%40anthropic-ai/claude-code

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.1.53

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-mmgp-wc2j-qcv7/GHSA-mmgp-wc2j-qcv7.json"