CVE-2026-33068 is a configuration loading order defect in Anthropic's Claude Code CLI tool (versions prior to 2.1.53). A malicious
`.claude/settings.json`
file in a repository can bypass the workspace trust confirmation dialog by exploiting the order in which settings are resolved.
The mechanism: Claude Code supports a
`bypassPermissions`
field in settings files. This is a legitimate, documented feature intended for trusted workspaces. The vulnerability is that repository-level settings (
`.claude/settings.json`
) are loaded and resolved before the workspace trust dialog is presented to the user. A malicious repository can include a settings file with
`bypassPermissions`
entries, and those permissions are applied before the user has an opportunity to review and approve the workspace.
This is CWE-807: Reliance on Untrusted Inputs in a Security Decision. The trust decision (whether to grant elevated permissions) depends on inputs from the entity being evaluated (the repository). The security boundary between "untrusted repository" and "trusted workspace" is bridged by the settings loading order.
The fix in Claude Code 2.1.53 changes the loading order so that the trust dialog is presented before repository-level settings are resolved.
Worth noting:
`bypassPermissions`
is not a hidden feature or a misconfiguration. It is documented and useful for legitimate workflows. The bug is purely in the loading order.
文章来源: https://www.reddit.com/r/netsec/comments/1rz2xuw/claude_code_workspace_trust_dialog_bypass_via/
如有侵权请联系:admin#unsafe.sh