Description

Claude Code is an agentic coding tool. Prior to version 2.1.2, Claude Code's bubblewrap sandboxing mechanism failed to properly protect the .claude/settings.json configuration file when it did not exist at startup. While the parent directory was mounted as writable and .claude/settings.local.json was explicitly protected with read-only constraints, settings.json was not protected if it was missing. This allowed malicious code running inside the sandbox to create this file and inject persistent hooks (such as SessionStart commands) that would execute with host privileges when Claude Code was restarted. This issue has been patched in version 2.1.2.

INFO

Published Date :

2026-02-06T17:53:42.543Z

Last Modified :

2026-02-06T19:15:02.998Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-25725 vulnerability.

Vendors Products
Anthropic
  • Claude Code
Anthropics
  • Claude Code
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-25725.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact