Plattform
nodejs
Komponente
@anthropic-ai/claude-code
Behoben in
0.2.112
0.2.111
CVE-2025-54794 describes a path traversal vulnerability in the @anthropic-ai/claude-code library. This flaw stems from inadequate path validation, allowing attackers to potentially access files outside the intended current working directory. Versions prior to 0.2.111 are affected; however, deprecated versions have been forced to update, and standard auto-update users received the fix automatically. The vulnerability has been addressed in version 0.2.111.
The path traversal vulnerability allows an attacker to bypass directory restrictions and read arbitrary files on the system. Successful exploitation requires the attacker to either have an existing directory with a prefix matching the current working directory or the ability to create such a directory. They also need to be able to inject untrusted content into a Claude Code context window. This could lead to the exposure of sensitive data, including configuration files, source code, or other confidential information. The potential impact is significant, as it could compromise the integrity and confidentiality of the system and the data it processes.
CVE-2025-54794 was publicly disclosed on August 4, 2025. There is currently no indication of active exploitation campaigns targeting this vulnerability. No public proof-of-concept (PoC) code has been released. The vulnerability is not currently listed on the CISA KEV catalog.
Developers and organizations utilizing the @anthropic-ai/claude-code package in their Node.js applications are at risk. Specifically, those using older, unmanaged versions of the package or those who have not implemented robust input validation are particularly vulnerable.
• nodejs / server:
npm list @anthropic-ai/claude-code• nodejs / server:
npm audit @anthropic-ai/claude-code• nodejs / server: Check for directories with predictable names near the application's working directory. Examine application logs for unusual file access attempts.
disclosure
Exploit-Status
EPSS
0.05% (14% Perzentil)
CISA SSVC
The primary mitigation for CVE-2025-54794 is to upgrade to version 0.2.111 of the @anthropic-ai/claude-code library. Standard users on auto-update have already received this fix. For those not on auto-update, manually update the package using your preferred package manager (npm or yarn). If an immediate upgrade is not feasible, consider implementing stricter input validation and sanitization to prevent the injection of malicious file paths. While a WAF or proxy is unlikely to directly mitigate this vulnerability, it could provide an additional layer of defense against attempts to exploit it.
Actualice Claude Code a la versión 0.2.111 o superior. Esta versión corrige la vulnerabilidad de omisión de restricción de ruta. La actualización evitará el acceso no autorizado a archivos fuera del directorio de trabajo actual.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2025-54794 is a HIGH severity vulnerability in @anthropic-ai/claude-code allowing unauthorized file access due to a flawed path validation mechanism. Versions prior to 0.2.111 are affected.
You are affected if you are using @anthropic-ai/claude-code versions prior to 0.2.111. Users on standard auto-update received the fix. Deprecated versions have been forced to update.
Upgrade to version 0.2.111 or later of @anthropic-ai/claude-code. Implement strict input validation as a temporary workaround if upgrading is not immediately possible.
There is currently no indication of active exploitation of CVE-2025-54794.
Refer to the official @anthropic-ai documentation and release notes for details regarding this vulnerability and the fix.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.