Claude Code vulnerable to command execution prior to startup trust dialog
High severity
GitHub Reviewed
Published
Nov 19, 2025
in
anthropics/claude-code
•
Updated Nov 19, 2025
Description
Published by the National Vulnerability Database
Nov 19, 2025
Published to the GitHub Advisory Database
Nov 19, 2025
Reviewed
Nov 19, 2025
Last updated
Nov 19, 2025
When running on a machine with Yarn 3.0 or above, Claude Code could have been tricked to execute code contained in a project via yarn plugins before the user accepted the startup trust dialog. Exploiting this would have required a user to start Claude Code in an untrusted directory and to be using Yarn 3.0 or above.
Users on standard Claude Code auto-update will have received this fix automatically. Users performing manual updates are advised to update to the latest version.
Thank you to Benjamin Faller, Redguard AG and Michael Hess for reporting this issue!
References