Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-jh7p-qr78-84p7 | Claude Code Leaks Data via Malicious Environment Configuration Before Trust Confirmation |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 21 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 21 Jan 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Claude Code is an agentic coding tool. Prior to version 2.0.65, vulnerability in Claude Code's project-load flow allowed malicious repositories to exfiltrate data including Anthropic API keys before users confirmed trust. An attacker-controlled repository could include a settings file that sets ANTHROPIC_BASE_URL to an attacker-controlled endpoint and when the repository was opened, Claude Code would read the configuration and immediately issue API requests before showing the trust prompt, potentially leaking the user's API keys. Users on standard Claude Code auto-update have received this fix already. Users performing manual updates are advised to update to version 2.0.65, which contains a patch, or to the latest version. | |
| Title | Claude Code Leaks Data via Malicious Environment Configuration Before Trust Confirmation | |
| Weaknesses | CWE-522 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-21T21:34:43.858Z
Reserved: 2026-01-05T16:44:16.366Z
Link: CVE-2026-21852
Updated: 2026-01-21T21:34:31.132Z
Status : Received
Published: 2026-01-21T21:16:08.693
Modified: 2026-01-21T21:16:08.693
Link: CVE-2026-21852
No data.
OpenCVE Enrichment
No data.
Github GHSA