<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Claude-Code-Cache-Fix — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/claude-code-cache-fix/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 13 May 2026 15:37:28 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/claude-code-cache-fix/feed.xml" rel="self" type="application/rss+xml"/><item><title>claude-code-cache-fix Local Code Execution via Python Injection (CVE-2026-45136)</title><link>https://feed.craftedsignal.io/briefs/2026-05-claude-code-exec/</link><pubDate>Wed, 13 May 2026 15:37:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-claude-code-exec/</guid><description>A vulnerability exists in claude-code-cache-fix versions 3.5.0 and 3.5.1 where the `tools/quota-statusline.sh` script interpolates Claude Code's hook stdin payload directly into a Python triple-quoted string literal, allowing local code execution via Python triple-quote injection (CVE-2026-45136).</description><content:encoded><![CDATA[<p>Claude Code versions 3.5.0 and 3.5.1 are vulnerable to local code execution via Python injection. The vulnerability lies in the <code>tools/quota-statusline.sh</code> script, which is recommended in the v3.5.0 README for wiring into the <code>statusLine</code> configuration. The script directly interpolates Claude Code&rsquo;s hook stdin payload into a Python triple-quoted string literal. By crafting a malicious directory name containing the sequence <code>'''</code>, an attacker can prematurely close the string literal and inject arbitrary Python code into the user&rsquo;s Claude Code process. This code executes with the user&rsquo;s privileges, allowing access to sensitive data and resources. The vulnerability was reported on 2026-05-07 and patched in version 3.5.2, released on the same day.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A malicious actor crafts a directory name containing the string <code>'''</code> followed by arbitrary Python code and another <code>'''</code> to close the string.</li>
<li>The attacker delivers the hostile directory to the victim&rsquo;s filesystem via any means (e.g., <code>git clone</code>, archive extraction, npm package installation, downloaded zip file).</li>
<li>The victim has <code>tools/quota-statusline.sh</code> configured as the <code>statusLine</code> hook in their Claude Code settings as recommended.</li>
<li>The victim navigates into the directory containing the hostile path using the <code>cd</code> command in their shell. This can also occur if a project or workspace is opened from the hostile path.</li>
<li>Claude Code&rsquo;s statusline hook is triggered upon every statusline redraw, which happens frequently.</li>
<li>The <code>tools/quota-statusline.sh</code> script executes, interpolating the user-controlled directory path into the Python command.</li>
<li>The malicious payload injected via the directory name is executed as Python code within the context of the user&rsquo;s Claude Code process.</li>
<li>The attacker gains local code execution with the privileges of the user running Claude Code, allowing them to access files, SSH keys, and other sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability leads to local code execution with the privileges of the user running Claude Code. An attacker can gain access to the user&rsquo;s files, SSH keys, and other sensitive credentials. This can lead to complete compromise of the user&rsquo;s local environment and potentially lateral movement to other systems if credentials are reused. Users who followed the recommended setup instructions in the v3.5.0 README are particularly at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to claude-code-cache-fix version 3.5.2 or later to remediate CVE-2026-45136.</li>
<li>Disable the statusline by removing the <code>statusLine</code> entry from <code>~/.claude/settings.json</code> as a temporary workaround.</li>
<li>Deploy the Sigma rule &ldquo;Detect Python Code Injection via quota-statusline.sh (CVE-2026-45136)&rdquo; to your SIEM to detect potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>code-execution</category><category>injection</category><category>linux</category></item></channel></rss>