Claude Code exposes deeplink-based remote command execution
According to reporting indexed by itsecuritynews.info from GBHackers Security, security researcher Joernchen disclosed a vulnerability in Anthropic's Claude Code CLI that allowed execution of arbitrary system commands via a single crafted deeplink URL. The flaw, described as stemming from insecure CLI flag parsing during deeplink handling in researcher writeups reported by 0day.click and diginews.johandenoyer.fr, was fixed in Claude Code version 2.1.118, per the itsecuritynews.info article. Public coverage highlights how convenience features that invoke local CLIs can become remote code execution vectors when parsing and validation are incomplete.
What happened
According to itsecuritynews.info, which indexed reporting from GBHackers Security, security researcher Joernchen documented a vulnerability in Anthropic's Claude Code CLI that allowed arbitrary system commands to be executed using a single crafted deeplink URL. The vulnerability was reported fixed in Claude Code version 2.1.118, per the same itsecuritynews.info article. Additional writeups summarized on 0day.click and diginews.johandenoyer.fr describe the same issue and the exploit technique.
Technical details
Reporting by 0day.click and diginews.johandenoyer.fr attributes the root cause to insecure CLI flag parsing in the deeplink handler, which allowed injected command fragments to be interpreted as executable flags or commands by the local shell. The researcher demonstrated that a carefully crafted deeplink could pass through developer-configured convenience plumbing and result in remote code execution on the host running the CLI.
Industry context
Editorial analysis: Developer tooling that exposes deeplink or URL handlers and then forwards input into local command interpreters often increases attack surface if parsing and sanitization are insufficient. Similar classes of bugs have produced RCEs in other ecosystems when user-controlled strings reach shell-invocation paths.
For practitioners
Editorial analysis: Security teams should treat deeplink handlers and CLI wrappers as part of the trusted computing base and include them in threat models, code review checklists, and fuzzing targets. Observability on CLI invocation paths and limiting the privileges of processes handling deeplinks reduce blast radius even when parsing bugs exist.
What to watch
Confirm deployment of Claude Code version 2.1.118 in environments where the CLI is reachable from untrusted sources. Watch for follow-up writeups or CVE assignments from mainstream vulnerability trackers and for any related advisories from package repositories or OS vendors.
Scoring Rationale
This is a notable RCE in a widely used AI developer tool that matters to practitioners who run or audit CLI tooling. The issue is patched, reducing immediate risk, but it exemplifies a recurring class of tooling vulnerabilities relevant to secure AI development.
Practice interview problems based on real data
1,500+ SQL & Python problems across 15 industry datasets — the exact type of data you work with.
Try 250 free problems
