Introducing Wiz for Exposure Management: Unify, prioritize, and remediate exposures everywhere.

CVE-2025-54794
JavaScript vulnerability analysis and mitigation

Overview

CVE-2025-54794 affects Claude Code, an agentic coding tool, in versions below 0.2.111. The vulnerability was discovered by security researcher Elad Beber from Cymulate during Anthropic's Research Preview phase and was disclosed on August 1, 2025. The issue stems from a path validation flaw that uses prefix matching instead of canonical path comparison (GitHub Advisory).

Technical details

The vulnerability is a path restriction bypass (CWE-22) that allows attackers to circumvent directory restrictions and access files outside the Current Working Directory (CWD). The flaw occurs due to naive prefix-based path validation that can be bypassed through directory name manipulation. The vulnerability has received a CVSS v4.0 base score of 7.7 (High), with attack vector: Network, attack complexity: Low, privileges required: None, and user interaction: Passive (GBHackers, GitHub Advisory).

Impact

Successful exploitation of this vulnerability could allow attackers to access files outside the intended sandbox environment. When combined with symbolic links, this vulnerability enables access to critical system files, potentially leading to privilege escalation in environments where Claude Code runs with elevated privileges (GBHackers).

Mitigation and workarounds

The vulnerability has been patched in version 0.2.111 with the implementation of robust canonical path comparison. Users on standard Claude Code auto-update received this fix automatically after release. Current users of Claude Code are unaffected, as versions prior to 1.0.24 are deprecated and have been forced to update (GitHub Advisory).

Community reactions

The discovery highlighted a remarkable aspect where the researcher used Claude itself to reverse-engineer Claude Code's security mechanisms, with the AI unwittingly providing insights into its own vulnerabilities. This 'InversePrompt' approach highlighted fundamental flaws in the assistant's path validation and command execution controls (GBHackers).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management