In versions 2.1.63 through 2.1.83 of Claude Code, the folder trust determination logic used the git worktree commondir file without validating its contents. An attacker could craft a malicious repository with a commondir file pointing to a path the victim had previously trusted, causing Claude Code to bypass its trust confirmation dialog and immediately execute hooks defined in `.claude/settings.json`. Exploitation requires the victim to clone the malicious repository and run Claude Code within it, and the attacker must know or guess a path the victim had already trusted. This issue has been fixed in version 2.1.84.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-q5hj-mxqh-vv77 | Claude Code: Trust Dialog Bypass via Git Worktree Spoofing Allows Arbitrary Code Execution |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 05 May 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Anthropics
Anthropics claude Code |
|
| Vendors & Products |
Anthropics
Anthropics claude Code |
Tue, 05 May 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In versions 2.1.63 through 2.1.83 of Claude Code, the folder trust determination logic used the git worktree commondir file without validating its contents. An attacker could craft a malicious repository with a commondir file pointing to a path the victim had previously trusted, causing Claude Code to bypass its trust confirmation dialog and immediately execute hooks defined in `.claude/settings.json`. Exploitation requires the victim to clone the malicious repository and run Claude Code within it, and the attacker must know or guess a path the victim had already trusted. This issue has been fixed in version 2.1.84. | |
| Title | Claude Code arbitrary code execution via git worktree commondir trust dialog bypass | |
| Weaknesses | CWE-20 CWE-77 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-05T20:52:26.089Z
Reserved: 2026-04-09T00:39:12.204Z
Link: CVE-2026-40068
No data.
Status : Received
Published: 2026-05-05T21:16:23.093
Modified: 2026-05-05T21:16:23.093
Link: CVE-2026-40068
No data.
OpenCVE Enrichment
Updated: 2026-05-05T22:30:33Z
Github GHSA