
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2025-54794 affects Claude Code, an agentic coding tool, in versions below 0.2.111. The vulnerability was discovered by security researcher Elad Beber from Cymulate during Anthropic's Research Preview phase and was disclosed on August 1, 2025. The issue stems from a path validation flaw that uses prefix matching instead of canonical path comparison (GitHub Advisory).
The vulnerability is a path restriction bypass (CWE-22) that allows attackers to circumvent directory restrictions and access files outside the Current Working Directory (CWD). The flaw occurs due to naive prefix-based path validation that can be bypassed through directory name manipulation. The vulnerability has received a CVSS v4.0 base score of 7.7 (High), with attack vector: Network, attack complexity: Low, privileges required: None, and user interaction: Passive (GBHackers, GitHub Advisory).
Successful exploitation of this vulnerability could allow attackers to access files outside the intended sandbox environment. When combined with symbolic links, this vulnerability enables access to critical system files, potentially leading to privilege escalation in environments where Claude Code runs with elevated privileges (GBHackers).
The vulnerability has been patched in version 0.2.111 with the implementation of robust canonical path comparison. Users on standard Claude Code auto-update received this fix automatically after release. Current users of Claude Code are unaffected, as versions prior to 1.0.24 are deprecated and have been forced to update (GitHub Advisory).
The discovery highlighted a remarkable aspect where the researcher used Claude itself to reverse-engineer Claude Code's security mechanisms, with the AI unwittingly providing insights into its own vulnerabilities. This 'InversePrompt' approach highlighted fundamental flaws in the assistant's path validation and command execution controls (GBHackers).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."