Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-mmgp-wc2j-qcv7 | Claude Code has a Workspace Trust Dialog Bypass via Repo-Controlled Settings File |
Tue, 24 Mar 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Anthropic
Anthropic claude Code |
|
| CPEs | cpe:2.3:a:anthropic:claude_code:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Anthropic
Anthropic claude Code |
|
| Metrics |
cvssV3_1
|
Fri, 20 Mar 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Anthropics
Anthropics claude Code |
|
| Vendors & Products |
Anthropics
Anthropics claude Code |
Fri, 20 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Mar 2026 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Claude Code is an agentic coding tool. Versions prior to 2.1.53 resolved the permission mode from settings files, including the repo-controlled .claude/settings.json, before determining whether to display the workspace trust confirmation dialog. A malicious repository could set permissions.defaultMode to bypassPermissions in its committed .claude/settings.json, causing the trust dialog to be silently skipped on first open. This allowed a user to be placed into a permissive mode without seeing the trust confirmation prompt, making it easier for an attacker-controlled repository to gain tool execution without explicit user consent. This issue has been patched in version 2.1.53. | |
| Title | Claude Code has a Workspace Trust Dialog Bypass via Repo-Controlled Settings File | |
| Weaknesses | CWE-807 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-20T13:48:36.014Z
Reserved: 2026-03-17T19:27:06.343Z
Link: CVE-2026-33068
Updated: 2026-03-20T13:48:31.483Z
Status : Analyzed
Published: 2026-03-20T09:16:15.017
Modified: 2026-03-24T15:46:36.440
Link: CVE-2026-33068
No data.
OpenCVE Enrichment
Updated: 2026-03-25T14:29:53Z
Github GHSA