Claude Code: Trust Dialog Bypass via Git Worktree Spoofing Allows Arbitrary Code Execution
High severity
GitHub Reviewed
Published
Apr 24, 2026
in
anthropics/claude-code
•
Updated Apr 24, 2026
Package
Affected versions
>= 2.1.63, < 2.1.84
Patched versions
2.1.84
Description
Published to the GitHub Advisory Database
Apr 24, 2026
Reviewed
Apr 24, 2026
Last updated
Apr 24, 2026
Claude Code used the git worktree
commondirfile when determining folder trust but did not validate its contents. By crafting a repository with acommondirfile pointing to a path the victim had previously trusted, an attacker could bypass the trust dialog and immediately execute malicious hooks defined in.claude/settings.json. Exploiting this required the victim to clone a malicious repository and run Claude Code within it, and for the attacker to know or guess a path the victim had already trusted.Users on standard Claude Code auto-update have received this fix already. Users performing manual updates are advised to update to the latest version.
Claude Code thanks hackerone.com/masato_anzai for reporting this issue.
References