Anthropic patches critical zero-click flaw in Claude Chrome extension

April 5, 20262 min read2 sources
Share:
Anthropic patches critical zero-click flaw in Claude Chrome extension

A severe vulnerability in Anthropic's Claude AI Google Chrome extension allowed any website to silently inject malicious prompts into the assistant, requiring no user interaction. The flaw was discovered by security researchers and promptly patched by Anthropic in mid-May.

The vulnerability, identified by researchers Oren Yomtov and Dolev Farhi of Koi Security, combined an insecure message-passing mechanism with a Cross-Site Scripting (XSS) bug. According to a report from Koi Security, a malicious website could send a specially crafted message to the Claude extension's content script. The extension would process this message and render the response directly into the webpage's code without proper sanitization. This allowed the malicious site to execute arbitrary code within the extension's context.

This zero-click exploit meant an attacker could take control of the AI assistant simply by having a user visit a compromised webpage. Potential impacts were significant, including data exfiltration, where an attacker could command Claude to summarize sensitive information from the user's active tab and send it to an external server. Other risks included performing unauthorized actions through the AI or stealing session cookies to hijack user accounts on other websites.

Koi Security reported the vulnerability to Anthropic on May 13, 2024. The AI company responded quickly, issuing a patched version (2024.5.15) just two days later on May 15. Most users of the Claude extension should have been automatically updated to the secure version. This incident highlights the security challenges posed by browser extensions that integrate with powerful AI tools, which can create new and potent attack vectors.

Share:

// SOURCES

// RELATED

Most 'AI SOCs' are just faster triage, and that's not enough

Many AI security tools only speed up alert analysis, failing to reduce analyst workload. Experts argue real gains require AI that automates response a

2 min readApr 17

ZionSiphon malware designed to sabotage water treatment systems

A new proof-of-concept malware, ZionSiphon, demonstrates how attackers can sabotage water treatment plants by manipulating industrial control systems.

2 min readApr 17

ThreatsDay bulletin: A deep dive into the Defender 0-day, SonicWall attacks, and a 17-year-old Excel flaw

This week’s threat bulletin is a heavy one. We analyze the critical Microsoft Defender 0-day, a massive SonicWall brute-force campaign, and a 17-year-

6 min readApr 17

Microsoft Defender's 'RedSun' zero-day: A researcher's protest and a threat to Windows systems

A researcher's protest exposed a critical zero-day in Microsoft Defender, allowing attackers full system control. Here's the technical breakdown and h

7 min readApr 17