Miggo Logo

CVE-2025-54794: Claude Code Research Preview has a Path Restriction Bypass which could allow unauthorized file access

N/A

CVSS Score

Basic Information

EPSS Score
-
Published
8/4/2025
Updated
8/4/2025
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
@anthropic-ai/claude-codenpm< 0.2.1110.2.111

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability is a path traversal issue in the @anthropic-ai/claude-code package, as described in GHSA-pmw4-pwvc-3hx2. The flaw lies in the use of prefix-based path validation instead of canonical path comparison, which can be bypassed to access files outside the current working directory. I was unable to identify the specific vulnerable functions because I could not locate the commit that patches this vulnerability. The security advisory does not provide a direct link to the commit, and my attempts to find it by inspecting repository tags were unsuccessful as the repository appears to have no tags. Without the diff from the fixing commit, I cannot determine which functions were modified and are therefore implicated in the vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*u* to * p*t* v*li**tion *l*w usin* pr**ix m*t**in* inst*** o* **noni**l p*t* *omp*rison, it w*s possi*l* to *yp*ss *ir**tory r*stri*tions *n* ****ss *il*s outsi** t** *W*. Su***ss*ul *xploit*tion **p*n*s on t** pr*s*n** o* (or **ility to *r**t*) * *

Reasoning

T** vuln*r**ility is * p*t* tr*v*rs*l issu* in t** `@*nt*ropi*-*i/*l*u**-*o**` p**k***, *s **s*ri*** in **S*-pmw*-pwv*-**x*. T** *l*w li*s in t** us* o* pr**ix-**s** p*t* v*li**tion inst*** o* **noni**l p*t* *omp*rison, w*i** **n ** *yp*ss** to ****s
CVE-2025-54794: Claude Code Path Trav Bypass | Miggo