top of page

Claude Extension Zero-Click XSS Vulnerability Allows Prompt Injection from Any Website

  • Mar 26
  • 2 min read

Key Findings


  • Vulnerability in Anthropic's Claude Chrome extension allowed zero-click prompt injection from any website without user interaction or permission prompts

  • Attack chains two flaws: overly permissive origin allowlist and DOM-based XSS in Arkose Labs CAPTCHA component

  • Successful exploitation could enable data theft, access token compromise, conversation history access, and account takeover

  • Patch deployed December 27, 2025 (version 1.0.41); Arkose Labs fixed XSS component February 19, 2026


Background


Researchers at Koi Security discovered the vulnerability, codenamed ShadowPrompt, which exploited fundamental trust assumptions in how the Claude extension validates requests. The flaw demonstrated how even well-intentioned browser extensions can become attack vectors when security boundaries are not carefully defined.


Technical Vulnerability Chain


The attack relied on two underlying flaws working in tandem. First, the extension maintained an overly permissive allowlist that trusted any subdomain matching the pattern *.claude.ai to send prompts for execution. Second, a DOM-based XSS vulnerability existed in an Arkose Labs CAPTCHA component hosted on a-cdn.claude.ai that allowed arbitrary JavaScript execution.


An attacker could embed the vulnerable Arkose component in a hidden iframe on their website, send an XSS payload via postMessage, and the injected script would fire a prompt directly to the Claude extension. The extension would accept this request as legitimate because it originated from an allowlisted domain. The victim would see nothing suspicious throughout the entire process.


Attack Impact


Successful exploitation granted attackers significant capabilities over the victim's browser environment. Attackers could steal sensitive authentication tokens, access the user's entire conversation history with Claude, and perform actions on behalf of the victim such as sending emails or requesting confidential information. This essentially transformed the extension into an autonomous agent under attacker control.


Remediation


Anthropic responded with a patch in version 1.0.41 that enforced strict origin checking requiring exact domain matching to claude.ai rather than accepting any subdomain. Arkose Labs independently fixed the XSS vulnerability in their CAPTCHA component. The coordinated response highlighted the importance of responsible disclosure and cross-vendor collaboration in addressing security issues.


Broader Security Implications


The incident underscores a critical challenge as AI browser assistants become more capable. Extensions that can navigate browsers, read credentials, and perform actions on behalf of users become high-value targets. The security posture of such tools depends entirely on how carefully their trust boundaries are defined. As these assistants gain more autonomous capabilities, the attack surface expands proportionally, requiring increasingly rigorous security practices during development.


Sources


  • https://thehackernews.com/2026/03/claude-extension-flaw-enabled-zero.html

  • https://www.youtube.com/watch?v=pUVikRiEbYE

  • https://www.socdefenders.ai/item/4129d637-c79b-4bd7-a96a-1044636946f6

  • https://x.com/TheCyberSecHub/status/2037160793314386018

  • https://www.cypro.se/2026/03/26/claude-extension-flaw-enabled-zero-click-xss-prompt-injection-via-any-website/

Recent Posts

See All
Claude Opus Generated a Chrome Exploit for $2,283

Key Findings Claude Opus 4.6 successfully generated a functional Chrome exploit chain for $2,283 in API costs across 2.33 billion tokens The exploit targeted Discord's bundled Chrome version 138, whic

 
 
 

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page