CVE-2026-41686

GHSA-p7fg-763f-g4gf MEDIUM
Published April 29, 2026

The `BetaLocalFilesystemMemoryTool` in the Anthropic TypeScript SDK created memory files and directories using the Node.js default modes (`0o666` for files, `0o777` for directories), leaving them world-readable on systems with a standard umask and world-writable in environments with a permissive...

Full CISO analysis pending enrichment.

Affected Systems

Package Ecosystem Vulnerable Range Patched
@anthropic-ai/sdk npm >= 0.79.0, < 0.91.1 0.91.1
1.9K 359 dependents Pushed 5d ago 67% patched ~1d to patch Full package profile →

Do you use @anthropic-ai/sdk? You're affected.

Severity & Risk

CVSS 3.1
N/A
EPSS
N/A
Exploitation Status
No known exploitation
Sophistication
N/A

Recommended Action

Patch available

Update @anthropic-ai/sdk to version 0.91.1

Compliance Impact

Compliance analysis pending. Sign in for full compliance mapping when available.

Frequently Asked Questions

What is CVE-2026-41686?

Claude SDK for TypeScript has Insecure Default File Permissions in Local Filesystem Memory Tool

Is CVE-2026-41686 actively exploited?

No confirmed active exploitation of CVE-2026-41686 has been reported, but organizations should still patch proactively.

How to fix CVE-2026-41686?

Update to patched version: @anthropic-ai/sdk 0.91.1.

What is the CVSS score for CVE-2026-41686?

No CVSS score has been assigned yet.

Technical Details

NVD Description

The `BetaLocalFilesystemMemoryTool` in the Anthropic TypeScript SDK created memory files and directories using the Node.js default modes (`0o666` for files, `0o777` for directories), leaving them world-readable on systems with a standard umask and world-writable in environments with a permissive umask such as many Docker base images. A local attacker on a shared host could read persisted agent state, and in containerized deployments could modify memory files to influence subsequent model behavior. Users on the affected versions are advised to update to the latest version. Claude SDK thanks `lucasfutures` for the report.

Timeline

Published
April 29, 2026
Last Modified
April 29, 2026
First Seen
April 30, 2026

Related Vulnerabilities