Claude Code vulnerable to arbitrary code execution caused by maliciously configured git email
High severity
GitHub Reviewed
Published
Sep 9, 2025
in
anthropics/claude-code
•
Updated Sep 10, 2025
Description
Published by the National Vulnerability Database
Sep 10, 2025
Published to the GitHub Advisory Database
Sep 10, 2025
Reviewed
Sep 10, 2025
Last updated
Sep 10, 2025
At startup, Claude Code executed a command templated in with
git config user.email
. A maliciously configured user email in git could be used to trigger arbitrary code execution before a user accepted the workspace trust dialog.Users on standard Claude Code auto-update will have received this fix automatically. Users performing manual updates are advised to update to the latest version.
Thank you to the NVIDIA AI Red Team for reporting this issue!
References