VulnerabilitiesHIGH

Vulnerability - Claude Extension Flaw Enables Zero-Click Attack

THThe Hacker News
Claude ExtensionXSS VulnerabilityArkose LabsAnthropic
🎯

Basically, a flaw in the Claude extension lets hackers send commands just by visiting a website.

Quick Summary

A new vulnerability in the Claude Chrome Extension allows attackers to exploit it via any website. This could lead to unauthorized access to sensitive data. Users are urged to update their extensions immediately to mitigate risks.

The Flaw

Cybersecurity researchers recently uncovered a significant vulnerability in Anthropic's Claude Google Chrome Extension. This flaw enables attackers to trigger malicious prompts simply by visiting any web page. According to Koi Security researcher Oren Yomtov, the issue stems from an overly permissive origin allowlist combined with a cross-site scripting (XSS) vulnerability in a CAPTCHA component. This means that attackers can silently inject commands into the extension, making it seem as if the user initiated them.

The vulnerability allows any subdomain matching the pattern (*.claude.ai) to send prompts to the Claude extension for execution. This is particularly concerning because it requires no user interaction—just visiting a compromised page is enough for the attack to occur. The XSS vulnerability in the Arkose Labs CAPTCHA component hosted on "a-cdn.claude[.]ai" enables the execution of arbitrary JavaScript code, which can then issue prompts to the extension without the user's knowledge.

What's at Risk

The potential consequences of this vulnerability are severe. Successful exploitation could allow attackers to access sensitive data such as access tokens and conversation history with the AI assistant. Furthermore, adversaries could perform actions on behalf of the victim, such as sending emails or requesting confidential information. This level of control over a user's browser raises significant security concerns, especially as AI assistants become more integrated into daily tasks.

Users may not even be aware that their browser is being manipulated. The attack can occur in the background, making it difficult to detect. As AI browser assistants gain more capabilities, they also become more attractive targets for cybercriminals. The implications of this vulnerability extend beyond individual users to organizations that rely on such tools for communication and data management.

Patch Status

Following responsible disclosure on December 27, 2025, Anthropic took swift action to address the vulnerability. They deployed a patch to the Chrome extension that enforces a strict origin check, requiring an exact match to the domain "claude[.]ai." This change significantly reduces the risk of unauthorized prompt injections. Additionally, Arkose Labs has fixed the XSS flaw on their end as of February 19, 2026, further strengthening the security of the component involved.

These patches are crucial in mitigating the risks associated with this vulnerability. Users are encouraged to update their extensions to the latest version to ensure they are protected against potential exploits. Keeping software up to date is one of the best defenses against such vulnerabilities.

Immediate Actions

For users of the Claude extension, it is vital to take immediate action to protect themselves. Here are some steps to consider:

  • Update the extension: Ensure that you are using the latest version of the Claude extension to benefit from the security patches.
  • Be cautious with web pages: Avoid visiting untrusted or suspicious websites that could exploit this vulnerability.
  • Monitor account activity: Keep an eye on your accounts for any unusual activity that may indicate unauthorized access.
  • Educate yourself: Stay informed about the latest cybersecurity threats and best practices to enhance your online safety.

By taking these proactive measures, users can better safeguard their information and reduce the risk of falling victim to such vulnerabilities.

🔒 Pro insight: This vulnerability highlights the critical need for stringent origin checks in browser extensions to prevent unauthorized command execution.

Original article from

The Hacker News

Read Full Article

Related Pings

HIGHVulnerabilities

BIND Vulnerabilities - High-Severity Issues Patched

BIND has released critical updates to fix high-severity vulnerabilities that could lead to service disruptions. Users must update their systems to ensure continued reliability. Ignoring these patches could result in significant downtime and accessibility issues.

SecurityWeek·
HIGHVulnerabilities

Cisco IOS Software Vulnerabilities - Critical Patches Released

Cisco has released critical patches for multiple vulnerabilities in its IOS software. These flaws could allow denial-of-service attacks and privilege escalation. Users are urged to update their systems immediately to protect against potential exploitation.

SecurityWeek·
CRITICALVulnerabilities

Synology Vulnerability - Remote Attackers Can Execute Commands

A severe vulnerability in Synology's DiskStation Manager allows remote attackers to execute arbitrary commands. This affects many NAS systems used for enterprise data management. Immediate patching is crucial to protect sensitive data from unauthorized access.

Cyber Security News·
CRITICALVulnerabilities

Cisco Secure Firewall - Critical Remote Code Execution Flaw

Cisco has revealed a critical vulnerability in its Secure Firewall. This flaw allows remote attackers to execute code as root, posing serious risks. Immediate patching is essential to protect affected systems.

Cyber Security News·
HIGHVulnerabilities

Coruna Exploit Kit - Updated Version of Triangulation Exploit

Kaspersky experts have uncovered the Coruna exploit kit targeting iPhones. This sophisticated kit uses updated exploits from Operation Triangulation, posing a serious risk to users. Stay informed and protect your device from potential breaches.

Kaspersky Securelist·
HIGHVulnerabilities

Vulnerabilities in Segmented OT - Insights from HD Moore

HD Moore warns about vulnerabilities in segmented OT environments. Many organizations are unaware of these risks, which could lead to serious breaches. It's crucial to adopt better security measures to protect essential operations.

SC Media·