CVE-2026-35020 PUBLISHED

Anthropic Claude Code & Agent SDK OS Command Injection via TERMINAL Environment Variable

Assigner: VulnCheck
Reserved: 31.03.2026 Published: 06.04.2026 Updated: 06.04.2026

Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection vulnerability in the command lookup helper and deep-link terminal launcher that allows local attackers to execute arbitrary commands by manipulating the TERMINAL environment variable. Attackers can inject shell metacharacters into the TERMINAL variable which are interpreted by /bin/sh when the command lookup helper constructs and executes shell commands with shell=true. The vulnerability can be triggered during normal CLI execution as well as via the deep-link handler path, resulting in arbitrary command execution with the privileges of the user running the CLI.

Metrics

CVSS Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 8.6

Product Status

Vendor Anthropic
Product Claude Code
Versions Default: unknown
  • affected from 0 to 2.1.91 (incl.)
Vendor Anthropic
Product Claude Agent SDK for Python
Versions Default: unknown
  • affected from 0 to 0.1.55 (incl.)

Credits

  • Francesco Cipollone finder

References

Problem Types

  • CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') CWE