CVE-2025-66032: Claude Code Command Validation Bypass Allows Arbitrary Code Execution
(updated )
Due to errors in parsing shell commands related to $IFS and short CLI flags, it was possible to bypass the Claude Code read-only validation and trigger arbitrary code execution. Reliably exploiting this requires the ability to add untrusted content into a Claude Code context window.
Users on standard Claude Code auto-update have received this fix already. Users performing manual updates are advised to update to the latest version.
Thank you to RyotaK from GMO Flatt Security Inc. for reporting this issue!
References
Code Behaviors & Features
Detect and mitigate CVE-2025-66032 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →