CVE-2026-34450
| Summary |
The Claude SDK for Python provides access to the Claude API from Python applications. From version 0.86.0 to before version 0.87.0, the local filesystem memory tool in the Anthropic Python SDK created memory files with mode 0o666, leaving them world-readable on systems with a standard umask and world-writable in environments with a permissive umask such as many Docker base images. A local attacker on a shared host could read persisted agent state, and in containerized deployments could modify memory files to influence subsequent model behavior. Both the synchronous and asynchronous memory tool implementations were affected. This issue has been patched in version 0.87.0.
|
| Publication Date |
April 1, 2026, 7:16 a.m. |
| Registration Date |
April 15, 2026, 11:22 a.m. |
| Last Update |
April 14, 2026, 12:10 a.m. |
|
CVSS3.1 : MEDIUM
|
| スコア |
4.4
|
| Vector |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N |
| 攻撃元区分(AV) |
ローカル |
| 攻撃条件の複雑さ(AC) |
低 |
| 攻撃に必要な特権レベル(PR) |
低 |
| 利用者の関与(UI) |
不要 |
| 影響の想定範囲(S) |
変更なし |
| 機密性への影響(C) |
低 |
| 完全性への影響(I) |
低 |
| 可用性への影響(A) |
なし |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:anthropic:claude_sdk_for_python:*:*:*:*:*:python:*:* |
0.86.0 |
|
|
0.87.0 |
Related information, measures and tools
Common Vulnerabilities List