A critical remote code execution vulnerability (CVE not yet disclosed) has been discovered in Anthropic’s Claude Code CLI tool. Attackers can trick victims into clicking a specially crafted deeplink, which then silently executes arbitrary commands on the target device without any interaction or confirmation. The vulnerability has been patched in Claude Code version 2.1.118.
Security researcher Joernchen (from 0day.click) identified the flaw while auditing the Claude Code source code. The root cause lies in the argument parser handling the claude-cli:// protocol — it fails to properly validate the --prefill option in the URI. Attackers can craft a malicious URI, inject the payload via the SessionStart hook, and set the repo parameter to a locally trusted repository (e.g., Anthropic’s own anthropics/claude-code), causing commands to execute silently in the background with no warning popup.


