Claude Code Vulnerable to Arbitrary Code Execution via Plugin Autoloading with Specific Yarn Versions
High severity
GitHub Reviewed
Published
Sep 24, 2025
in
anthropics/claude-code
•
Updated Dec 22, 2025
Description
Published to the GitHub Advisory Database
Sep 24, 2025
Reviewed
Sep 24, 2025
Published by the National Vulnerability Database
Sep 24, 2025
Last updated
Dec 22, 2025
When using Claude Code with Yarn installed, Yarn config files can trigger code execution when running
yarn --version. This could lead to a bypass of the directory trust dialog in Claude Code, as plugins andyarnPathcould be executed prior to the user accepting the risks of working in an untrusted directory. Users on standard Claude Code auto-update will have received this fix automatically. Users performing manual updates are advised to update to the latest version.Thank you to Benjamin Faller, Redguard AG and Michael Hess for reporting this issue!
References