Claude Code Vulnerable to Command Injection via Piped sed Command Bypasses File Write Restrictions
Description
Published by the National Vulnerability Database
Feb 6, 2026
Published to the GitHub Advisory Database
Feb 6, 2026
Reviewed
Feb 6, 2026
Claude Code failed to properly validate commands using piped sed operations with the echo command, allowing attackers to bypass file write restrictions. This vulnerability enabled writing to sensitive directories like the .claude folder and paths outside the project scope. Exploiting this required the ability to execute commands through Claude Code with the "accept edits" feature enabled.
Users on standard Claude Code auto-update received this fix automatically. Users performing manual updates are advised to update to the latest version.
Claude Code thanks hackerone.com/nil221 for reporting this issue!
References