CVE-2025-64755
Published: 21 November 2025
Description
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Security Summary
CVE-2025-64755 is a high-severity vulnerability in Claude Code, an agentic coding tool developed by Anthropic. In versions prior to 2.0.31, an error in sed command parsing allows bypassing the tool's read-only validation, enabling arbitrary file writes on the host system. The flaw is categorized as CWE-78 (Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')) and carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical risk due to its network accessibility and potential for complete host compromise.
The vulnerability can be exploited by any remote attacker without authentication, privileges, or user interaction, requiring only low attack complexity over the network. Successful exploitation grants the ability to write to arbitrary files on the host, which could lead to full system takeover, data exfiltration, persistence, or execution of malicious code, with high impacts on confidentiality, integrity, and availability.
Anthropic has patched the issue in Claude Code version 2.0.31. Security practitioners should upgrade to this version immediately. Additional details are available in the GitHub Security Advisory at https://github.com/anthropics/claude-code/security/advisories/GHSA-7mv8-j34q-vp7q.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
The vulnerability enables remote unauthenticated OS command injection in a network-accessible public-facing application (Claude Code), allowing arbitrary file writes and host compromise, directly mapping to T1190: Exploit Public-Facing Application.