Versions below 1.0.41 of the Claude Chrome extension contain a high-risk prompt injection vulnerability and must be updated promptly.

robot
Abstract generation in progress

According to a TechFlow report on March 27, citing Koi, a high-risk prompt injection vulnerability exists in the Claude Chrome extension under Anthropic, affecting all versions of the extension below 1.0.41.

Attackers can construct malicious web pages that silently load an iframe containing a cross-site scripting (XSS) vulnerability in the background, executing malicious payloads within the a-cdn.claude.ai subdomain. Since this subdomain is within the extension’s trusted whitelist, attackers can directly send malicious prompts to the Claude extension and execute them automatically, without any user authorization or clicks, leaving the victim unaware.

This vulnerability could allow attackers to manipulate the Claude extension to read users’ Google Drive documents, steal business access tokens, or export chat logs, and it can also take over the current browser session to perform sensitive operations like sending emails on behalf of the victim.

GoPlus recommends that users immediately update the Claude extension to version 1.0.41 or above, while also being cautious of phishing links.

View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
Add a comment
Add a comment
No comments
  • Pin