Claude Extension Flaw Enabled Zero-Click XSS Prompt Injection via Any Website
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内,而且不需要特定的开头。首先,我得仔细阅读文章,抓住主要信息。 文章讲的是Anthropic的Claude Google Chrome扩展被发现有漏洞。这个漏洞可以让攻击者通过访问一个网页就能触发恶意提示。具体来说,有两个问题:一个是扩展的允许列表过于宽松,允许任何子域名发送提示;另一个是Arkose Labs的CAPTCHA组件存在XSS漏洞。 攻击者可以利用这些漏洞,在用户不知情的情况下注入JavaScript代码,控制用户的浏览器,窃取敏感数据或执行恶意操作。后来,Anthropic和Arkose Labs分别修复了问题。 总结的时候,我需要包括关键点:漏洞的存在、影响、修复措施。同时要简洁明了,不超过100字。 现在组织语言:先说明发现漏洞及其影响,然后提到修复措施。确保信息完整且符合字数限制。 </think> 研究人员发现Anthropic的Claude Chrome扩展存在严重漏洞,允许网站通过XSS攻击注入恶意提示并控制浏览器。攻击者可窃取敏感数据或执行恶意操作。Anthropic已修复漏洞并加强了域名验证。 2026-3-26 13:11:0 Author: thehackernews.com(查看原文) 阅读量:9 收藏

Browser Security / Vulnerability

Cybersecurity researchers have disclosed a vulnerability in Anthropic's Claude Google Chrome Extension that could have been exploited to trigger malicious prompts simply by visiting a web page.

The flaw "allowed any website to silently inject prompts into that assistant as if the user wrote them," Koi Security researcher Oren Yomtov said in a report shared with The Hacker News. "No clicks, no permission prompts. Just visit a page, and an attacker completely controls your browser."

The issue chains two underlying flaws -

  • An overly permissive origin allowlist in the extension that allowed any subdomain matching the pattern (*.claude.ai) to send a prompt to Claude for execution.
  • A document object model (DOM)-based cross-site scripting (XSS) vulnerability in an Arkose Labs CAPTCHA component hosted on "a-cdn.claude[.]ai."

Specifically, the XSS vulnerability enables the execution of arbitrary JavaScript code in the context of "a-cdn.claude[.]ai." A threat actor could leverage this behavior to inject JavaScript that issues a prompt to the Claude extension.

The extension, for its part, allows the prompt to land in Claude's sidebar as if it's a legitimate user request simply because it comes from an allow-listed domain.

"The attacker's page embeds the vulnerable Arkose component in a hidden <iframe>, sends the XSS payload via postMessage, and the injected script fires the prompt to the extension," Yomtov explained. "The victim sees nothing."

Successful exploitation of this vulnerability could allow the adversary to steal sensitive data (e.g., access tokens), access conversation history with the AI agent, and even perform actions on behalf of the victim (e.g., sending emails impersonating them, asking for confidential data).

Following responsible disclosure on December 27, 2025, Anthropic deployed a patch to the Chrome extension that enforces a strict origin check requiring an exact match to the domain "claude[.]ai." Arkose Labs has since fixed the XSS flaw at its end as of February 19, 2026.

"The more capable AI browser assistants become, the more valuable they are as attack targets," Koi said. "An extension that can navigate your browser, read your credentials, and send emails on your behalf is an autonomous agent. And the security of that agent is only as strong as the weakest origin in its trust boundary."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/03/claude-extension-flaw-enabled-zero.html
如有侵权请联系:admin#unsafe.sh