<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-35021 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-35021/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 06 Apr 2026 20:16:25 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-35021/feed.xml" rel="self" type="application/rss+xml"/><item><title>Anthropic Claude Code CLI/Agent SDK OS Command Injection Vulnerability (CVE-2026-35021)</title><link>https://feed.craftedsignal.io/briefs/2026-04-claude-code-cmd-injection/</link><pubDate>Mon, 06 Apr 2026 20:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-claude-code-cmd-injection/</guid><description>The Anthropic Claude Code CLI and Claude Agent SDK are vulnerable to OS command injection via crafted file paths, allowing arbitrary command execution.</description><content:encoded><![CDATA[<p>The Anthropic Claude Code CLI and Claude Agent SDK are susceptible to an OS command injection vulnerability, as detailed in CVE-2026-35021. This flaw stems from the insufficient sanitization of file paths within the prompt editor invocation utility. An attacker can exploit this vulnerability by injecting shell metacharacters into file paths, which are then interpolated into shell commands executed using <code>execSync</code>. The use of double quotes around the file path does not prevent command substitution, enabling attackers to execute arbitrary commands with the privileges of the user running the CLI, creating a high-risk scenario for compromised systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious file path containing shell metacharacters (e.g., <code>$()</code>, backticks).</li>
<li>The malicious file path is provided as input to the Anthropic Claude Code CLI or Agent SDK, specifically targeting the prompt editor invocation utility.</li>
<li>The application interpolates the attacker-controlled file path into a shell command.</li>
<li>The shell command, now containing the injected payload, is executed via the <code>execSync</code> function.</li>
<li>The shell interprets the injected metacharacters, triggering command substitution.</li>
<li>The attacker&rsquo;s injected commands are executed with the privileges of the user running the CLI or SDK.</li>
<li>The attacker gains arbitrary code execution on the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to execute arbitrary commands on the affected system. This could lead to complete system compromise, data exfiltration, or deployment of malicious payloads such as ransomware. Due to the nature of the vulnerability, any system utilizing the Claude Code CLI or Agent SDK is potentially at risk if it processes untrusted file paths.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Suspicious Claude CLI/Agent SDK Command Execution</code> to identify potential command injection attempts via process creation logs.</li>
<li>Monitor process creation events for command line arguments containing shell metacharacters being passed to processes spawned by the Claude CLI or Agent SDK using the <code>Process Creation with Shell Metacharacters</code> Sigma rule.</li>
<li>Apply any available patches or updates released by Anthropic to address CVE-2026-35021 once they are available.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-35021</category><category>command-injection</category><category>anthropic</category></item></channel></rss>