Claude Code: Insecure System-Wide Configuration Loading Enables Local Privilege Escalation on Windows
Moderate severity
GitHub Reviewed
Published
Apr 17, 2026
in
anthropics/claude-code
•
Updated Apr 27, 2026
Description
Published by the National Vulnerability Database
Apr 17, 2026
Published to the GitHub Advisory Database
Apr 17, 2026
Reviewed
Apr 17, 2026
Last updated
Apr 27, 2026
On Windows, Claude Code loaded system-wide default configuration from
C:\ProgramData\ClaudeCode\managed-settings.jsonwithout validating directory ownership or access permissions. Because theProgramDatadirectory is writable by non-administrative users by default and theClaudeCodesubdirectory was not pre-created or access-restricted, a low-privileged local user could create this directory and place a malicious configuration file that would be automatically loaded for any user launching Claude Code on the same machine. Exploiting this would have required a shared multi-user Windows system and a victim user to launch Claude Code after the malicious configuration was placed.Users on standard Claude Code auto-update have received this fix already. Users performing manual updates are advised to update to the latest version.
Thank you to hackerone.com/edbr for reporting this issue.
References