Cyber Posture

CVE-2025-65099

CriticalRCE

Published: 19 November 2025

Published
19 November 2025
Modified
25 November 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0009 25.6th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-65099 is a critical-severity Code Injection (CWE-94) vulnerability in Anthropic Claude Code. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 25.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and SI-3 (Malicious Code Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Timely patching of Claude Code to version 1.0.39 directly eliminates the vulnerability allowing yarn plugin code execution before the trust dialog.

preventdetect

Malicious code protection mechanisms block or quarantine arbitrary code in yarn plugins from untrusted projects upon execution attempt.

detect

Integrity verification of software and project components detects unauthorized modifications or execution of malicious yarn plugins.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1211 Exploitation for Stealth Stealth
Adversaries may exploit vulnerabilities to evade detection by hiding activity, suppressing logging, or operating within trusted or unmonitored components.
Why these techniques?

The vulnerability enables arbitrary code execution via malicious Yarn plugins/config in an untrusted directory before the startup trust dialog, exploiting the client application (T1203) and bypassing the directory trust defense (T1211).

NVD Description

Claude Code is an agentic coding tool. Prior to version 1.0.39, when running on a machine with Yarn 3.0 or above, Claude Code could have been tricked to execute code contained in a project via yarn plugins before the user…

more

accepted the startup trust dialog. Exploiting this would have required a user to start Claude Code in an untrusted directory and to be using Yarn 3.0 or above. This issue has been patched in version 1.0.39.

Deeper analysisAI

CVE-2025-65099 is a code injection vulnerability (CWE-94) affecting Claude Code, an agentic coding tool from Anthropic, in versions prior to 1.0.39. The issue arises when Claude Code runs on a machine with Yarn 3.0 or above, allowing the tool to be tricked into executing arbitrary code contained in a project through yarn plugins before the user accepts the startup trust dialog. The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity with potential for high-impact confidentiality, integrity, and availability compromises.

Exploitation requires a user to initiate Claude Code in an untrusted directory while using Yarn 3.0 or higher, enabling an attacker with control over that project—such as through a malicious repository—to trigger code execution automatically upon startup, bypassing the trust dialog. No special privileges or additional user interaction beyond starting the tool in the compromised environment are needed, making it feasible for remote attackers distributing tainted projects.

The GitHub security advisory (GHSA-5hhx-v7f6-x7gv) confirms the issue has been addressed in Claude Code version 1.0.39, recommending users upgrade immediately to mitigate the risk. Practitioners should verify Yarn versions and audit directories before launching the tool in potentially untrusted contexts.

Details

CWE(s)

Affected Products

anthropic
claude code
≤ 1.0.39

CVEs Like This One

CVE-2025-59041Same product: Anthropic Claude Code
CVE-2025-58764Same product: Anthropic Claude Code
CVE-2026-24887Same product: Anthropic Claude Code
CVE-2026-33068Same product: Anthropic Claude Code
CVE-2025-54794Same product: Anthropic Claude Code
CVE-2025-54795Same product: Anthropic Claude Code
CVE-2025-64755Same product: Anthropic Claude Code
CVE-2026-39861Same product: Anthropic Claude Code
CVE-2026-25724Same product: Anthropic Claude Code
CVE-2026-24052Same product: Anthropic Claude Code

References