Claude Vulnerability - Silent Prompt Injection Attacks Exposed
Basically, a flaw let hackers control an AI tool without users knowing.
A serious vulnerability in the Claude Chrome Extension exposed millions to silent attacks. This flaw allowed hackers to access sensitive data without user interaction. Thankfully, the issue has been patched, but users must ensure they're updated to stay safe.
The Flaw
A critical zero-click vulnerability was discovered in Anthropic’s Claude Chrome Extension, impacting over 3 million users. This flaw allowed malicious websites to hijack the AI assistant without any user interaction. The vulnerability involved two main issues: an overly permissive origin allowlist and a flaw in a third-party CAPTCHA component.
The first issue was that the extension's messaging API accepted messages from any subdomain of *.claude.ai, which was too broad. The second flaw was linked to Arkose Labs, which provided CAPTCHA verification. A version of their CAPTCHA component had a DOM-based XSS vulnerability, allowing attackers to inject malicious scripts through a hidden iframe on a malicious webpage.
What's at Risk
This vulnerability could have enabled attackers to perform various malicious actions. They could steal Gmail access tokens, read files from Google Drive, and even send emails without the user's knowledge. The attack could be executed silently, meaning users wouldn't see any prompts or alerts indicating that their assistant was compromised. The implications of this vulnerability are severe, as it exposes sensitive personal information and undermines trust in AI tools.
Patch Status
The vulnerability was responsibly disclosed to Anthropic on December 26, 2025. The company confirmed the issue within 24 hours and deployed a fix by January 15, 2026. The patch replaced the wildcard allowlist with a strict origin check, ensuring that only requests from https://claude.ai would be accepted. The XSS vulnerability in the Arkose Labs component was reported separately and patched by February 19, 2026.
Immediate Actions
Users are urged to verify that their Claude Chrome Extension is updated to version 1.0.41 or higher. This can be done by navigating to chrome://extensions. This incident highlights a systemic risk in AI browser agents, where the security perimeter is only as strong as the weakest trusted origin. As AI assistants gain deeper access to browsers, the potential for exploitation increases, making it crucial for users to stay vigilant and keep their software updated.
Cyber Security News