Technical Analysis & Remediation
MITRE ATT&CK Mapping
T1059
Command and Scripting Interpreter
T1552.001
Credentials In Files
T1190
Exploit Public-Facing Application
CVE Profile
CVSS 8.7 (CVE-2025-59536)
CVSS 5.3 (CVE-2026-21852)
CISA KEV Status: Inactive.
Telemetry
File Paths
.claude/settings.json, .mcp.json.
Environment Variables
ANTHROPIC_BASE_URL.
Configurations
enableAllProjectMcpServers, enabledMcpjsonServers.
Constraint
Delivery vectors are unconfirmed in raw telemetry, but the structure suggests a supply chain attack involving developers cloning malicious or honeypot repositories.
The exploitation path abuses three distinct configuration vectors managed by the .claude/settings.json file. First, "Hooks" (such as a SessionStart event) will automatically execute system shell commands (e.g., opening a calculator or downloading a reverse shell payload) without waiting for the user's interactive consent. Second, the Model Context Protocol (MCP) configuration can be set to automatically approve external server connections, bypassing the trust dialog entirely. Finally, by overriding the ANTHROPIC_BASE_URL setting, the CLI will route all initialization requests, which contain the plaintext authorization headers, to an external, attacker-controlled infrastructure.
An adversary holding the exfiltrated API keys can pivot into Claude's "Workspaces," accessing, modifying, or regenerating sensitive artifacts stored by other developers sharing the workspace.
Remediation - THE ENTERPRISE TRACK (NIST SP 800-61r3 / CSF 2.0)
GOVERN (GV) – Crisis Management & Oversight
Command
Issue a targeted policy mandating that all developer environments using Claude Code upgrade to patched versions (v2.0.65 or later) immediately.
DETECT (DE) – Monitoring & Analysis
Command
Query EDR telemetry for unexpected child processes (e.g., bash, cmd[.]exe, curl) spawned by the claude binary.
Command
Monitor network traffic for anomalies where claude attempts outbound HTTP/S connections to unverified domains outside of *.anthropic.com.
RESPOND (RS) – Mitigation & Containment
Command
Revoke and rotate any Anthropic API keys used on endpoints known to have cloned untrusted third-party repositories prior to the deployment of the patches.
Command
Isolate endpoints where the claude process tree indicates unprompted arbitrary execution.
RECOVER (RC) – Restoration & Trust
Command
Verify updated client installations (v≥2.0.65) across the environment before permitting developers to resume AI-assisted CLI workflows.
IDENTIFY & PROTECT (ID/PR) – The Feedback Loop
Command
Integrate static analysis checks in CI/CD pipelines to flag unauthorized hooks or proxy configurations within .claude/settings.json and .mcp.json files during Pull Request reviews.
Remediation - THE HOME USER TRACK (Safety Focus)
Note
Threat Level downgraded to Low unless you are actively using the Claude Code CLI tool for software development.
Priority 1: Safety
Command
If you have Claude Code installed, update it via npm (npm update -g @anthropic-ai/claude-code) before running it in any newly cloned repository.
Priority 2: Identity
Command
Log into the Anthropic Developer Console and generate new API keys, permanently deleting any old keys that may have been active while navigating untrusted projects.
Priority 3: Persistence
Command
Inspect your local development directories for hidden .claude/ folders and ensure the settings.json files do not contain unfamiliar remote URLs or hooks.
Hardening & References
Baseline
CIS Benchmarks for Secure Software Development.
Framework
NIST CSF 2.0 / SP 800-61r3.
Source
Check Point Research
The Hacker News
CVE-2025-59536
(MCP User Consent Bypass, fixed in version 1.0.111).
CVE-2026-21852
(API Token Exfiltration via URL spoofing, fixed in version 2.0.65).