CVE-2025-58764
JavaScript Analisi e mitigazione delle vulnerabilità

Panoramica

Claude Code, an agentic coding tool, was found to contain a critical security vulnerability in versions prior to 1.0.105. The vulnerability (CVE-2025-58764) was discovered and disclosed on September 9, 2025, involving a command parsing error that allowed attackers to bypass the Claude Code confirmation prompt and execute untrusted commands. The vulnerability affects all Claude Code installations running versions earlier than 1.0.105 (GitHub Advisory).

Dettagli tecnici

The vulnerability has been assigned a CVSS v4.0 base score of 8.7 (High severity) with the vector string CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N. The issue is classified as CWE-94 (Improper Control of Generation of Code), indicating a code injection vulnerability. The vulnerability specifically manifests in the command parsing functionality, where the confirmation prompt meant to protect against untrusted command execution could be circumvented (GitHub Advisory, NVD).

Impatto

The vulnerability poses significant risks as it allows for unauthorized command execution with high potential impact on confidentiality, integrity, and availability of the affected systems. Successful exploitation could lead to execution of arbitrary commands within the Claude Code context window, potentially compromising the security of the affected systems (GitHub Advisory).

Mitigazione e soluzioni alternative

Users are strongly advised to update to Claude Code version 1.0.105 or later, which contains the fix for this vulnerability. Users on standard Claude Code auto-update will have received this fix automatically. Those performing manual updates should prioritize updating to the latest version (GitHub Advisory).

Reazioni della comunità

The vulnerability was responsibly disclosed by the NVIDIA AI Red Team, demonstrating active security research in the AI tooling ecosystem (GitHub Advisory).

Risorse aggiuntive


FonteQuesto report è stato generato utilizzando l'intelligenza artificiale

Imparentato JavaScript Vulnerabilità:

CVE ID

Severità

Punteggio

Tecnologie

Nome del componente

Exploit CISA KEV

Ha la correzione

Data di pubblicazione

CVE-2025-59041HIGH8.7
  • JavaScriptJavaScript
  • @anthropic-ai/claude-code
NoSep 10, 2025
CVE-2025-58754HIGH7.5
  • JavaScriptJavaScript
  • axios
NoSep 11, 2025
CVE-2025-59049HIGH7.5
  • JavaScriptJavaScript
  • @mockoon/commons-server
NoSep 10, 2025
CVE-2025-59052HIGH7.1
  • JavaScriptJavaScript
  • @angular/platform-server
NoSep 10, 2025
CVE-2025-57520MEDIUM6.1
  • JavaScriptJavaScript
  • decap-cms
NoNoSep 10, 2025

Valutazione gratuita delle vulnerabilità

Benchmark della tua posizione di sicurezza del cloud

Valuta le tue pratiche di sicurezza cloud in 9 domini di sicurezza per confrontare il tuo livello di rischio e identificare le lacune nelle tue difese.

Richiedi valutazione

Richiedi una demo personalizzata

Pronti a vedere Wiz in azione?

"La migliore esperienza utente che abbia mai visto offre piena visibilità ai carichi di lavoro cloud."
David EstlickCISO (CISO)
"Wiz fornisce un unico pannello di controllo per vedere cosa sta succedendo nei nostri ambienti cloud."
Adam FletcherResponsabile della sicurezza
"Sappiamo che se Wiz identifica qualcosa come critico, in realtà lo è."
Greg PoniatowskiResponsabile della gestione delle minacce e delle vulnerabilità