Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-q5hj-mxqh-vv77 | Claude Code: Trust Dialog Bypass via Git Worktree Spoofing Allows Arbitrary Code Execution |
Tue, 12 May 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Anthropic
Anthropic claude Code |
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:anthropic:claude_code:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Anthropic
Anthropic claude Code |
|
| Metrics |
cvssV3_1
|
Wed, 06 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 05 May 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Anthropics
Anthropics claude Code |
|
| Vendors & Products |
Anthropics
Anthropics claude Code |
Tue, 05 May 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In versions 2.1.63 through 2.1.83 of Claude Code, the folder trust determination logic used the git worktree commondir file without validating its contents. An attacker could craft a malicious repository with a commondir file pointing to a path the victim had previously trusted, causing Claude Code to bypass its trust confirmation dialog and immediately execute hooks defined in `.claude/settings.json`. Exploitation requires the victim to clone the malicious repository and run Claude Code within it, and the attacker must know or guess a path the victim had already trusted. This issue has been fixed in version 2.1.84. | |
| Title | Claude Code arbitrary code execution via git worktree commondir trust dialog bypass | |
| Weaknesses | CWE-20 CWE-77 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-06T15:24:52.454Z
Reserved: 2026-04-09T00:39:12.204Z
Link: CVE-2026-40068
Updated: 2026-05-06T14:50:08.585Z
Status : Analyzed
Published: 2026-05-05T21:16:23.093
Modified: 2026-05-12T16:21:46.630
Link: CVE-2026-40068
No data.
OpenCVE Enrichment
Updated: 2026-05-12T18:15:21Z
Github GHSA