Cyber Posture

CVE-2026-24887

HighRCE

Published: 03 February 2026

Published
03 February 2026
Modified
06 February 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0005 16.2th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-24887 is a high-severity OS Command Injection (CWE-78) vulnerability in Anthropic Claude Code. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Unix Shell (T1059.004); ranked at the 16.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

This vulnerability is AI-related — categorised as APIs and Models.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Unix Shell (T1059.004) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents OS command injection by validating untrusted content introduced into the Claude Code context window before command parsing and execution.

prevent

Ensures timely application of patches, such as upgrading to Claude Code version 2.0.72, to remediate the specific command parsing flaw.

prevent

Limits the scope and impact of untrusted command execution by enforcing least privilege on the Claude Code process and associated accounts.

MITRE ATT&CK Enterprise TechniquesAI

T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

Command injection (CWE-78) in Claude Code directly bypasses confirmation prompts to enable arbitrary Unix shell command execution (find command) on the host; the vuln is exploitable remotely with low privileges to achieve RCE and privilege escalation.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Claude Code is an agentic coding tool. Prior to version 2.0.72, due to an error in command parsing, it was possible to bypass the Claude Code confirmation prompt to trigger execution of untrusted commands through the find command. Reliably exploiting…

more

this required the ability to add untrusted content into a Claude Code context window. This issue has been patched in version 2.0.72.

Deeper analysisAI

CVE-2026-24887 affects Claude Code, an agentic coding tool from Anthropic, in versions prior to 2.0.72. The vulnerability stems from an error in command parsing that allows attackers to bypass the tool's confirmation prompt, enabling execution of untrusted commands via the find command. Associated with CWE-78 (OS Command Injection) and CWE-94 (Code Injection), it carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to network accessibility, low attack complexity, and significant impacts on confidentiality, integrity, and availability.

Exploitation requires an attacker with low privileges (PR:L) who can introduce untrusted content into a Claude Code context window, such as through manipulated inputs or shared sessions. Once injected, the malformed find command evades the confirmation mechanism, allowing arbitrary command execution on the host system without user interaction (UI:N). This could lead to full system compromise, data exfiltration, or persistent access, depending on the attacker's privileges and the environment.

The GitHub Security Advisory (GHSA-qgqw-h4xq-7w8w) confirms the issue was patched in Claude Code version 2.0.72 by fixing the command parsing logic. Security practitioners should upgrade to 2.0.72 or later and review usage of Claude Code in contexts where untrusted content might enter the tool's window, such as collaborative coding or automated pipelines.

Details

CWE(s)

Affected Products

anthropic
claude code
≤ 2.0.72

AI Security AnalysisAI

AI Category
APIs and Models
Risk Domain
N/A
OWASP Top 10 for LLMs 2025
None mapped
Classification Reason
Matched keywords: claude, claude, claude

CVEs Like This One

CVE-2026-39861Same product: Anthropic Claude Code
CVE-2025-59041Same product: Anthropic Claude Code
CVE-2026-25722Same product: Anthropic Claude Code
CVE-2026-33068Same product: Anthropic Claude Code
CVE-2025-65099Same product: Anthropic Claude Code
CVE-2026-25725Same product: Anthropic Claude Code
CVE-2025-64755Same product: Anthropic Claude Code
CVE-2025-58764Same product: Anthropic Claude Code
CVE-2026-25724Same product: Anthropic Claude Code
CVE-2026-21852Same product: Anthropic Claude Code

References