CVE-2025-15060

claude-hovercraft · claude-hovercraft

A command injection vulnerability in the executeClaudeCode method of claude-hovercraft allows unauthenticated remote attackers to execute arbitrary code.

Executive summary

A critical remote code execution vulnerability in claude-hovercraft allows unauthenticated attackers to gain full control over the service account through command injection.

Vulnerability

The flaw exists in the executeClaudeCode method due to a lack of validation for user-supplied strings before they are passed to a system call. This allows an unauthenticated remote attacker to inject and execute arbitrary shell commands.

Business impact

This vulnerability poses an extreme risk, as it allows for full Remote Code Execution (RCE) without any credentials. An attacker can compromise the host system, steal sensitive data, or use the server as a pivot point for lateral movement within the network. The CVSS score of 9.8 underscores the Critical nature of this security failure.

Remediation

Immediate Action: Update claude-hovercraft to the latest version immediately to patch the insecure executeClaudeCode implementation.

Proactive Monitoring: Monitor system logs for unusual child processes spawned by the claude-hovercraft service and check for unauthorized outbound network connections.

Compensating Controls: Restrict the service account's permissions using the principle of least privilege and implement egress filtering to block malicious callbacks.

Exploitation status

Public Exploit Available: No

Analyst recommendation

Immediate remediation is mandatory. Because this vulnerability requires no authentication and leads to total system compromise, administrators should apply the patch within 24 hours of discovery to mitigate the risk of a catastrophic security breach.