By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Claude Extension Flaw Enabled Zero-Click XSS Prompt Injection via Any Website
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Claude Extension Flaw Enabled Zero-Click XSS Prompt Injection via Any Website
Computing

Claude Extension Flaw Enabled Zero-Click XSS Prompt Injection via Any Website

News Room
Last updated: 2026/04/01 at 5:16 PM
News Room Published 1 April 2026
Share
Claude Extension Flaw Enabled Zero-Click XSS Prompt Injection via Any Website
SHARE

Ravie LakshmananMar 26, 2026Browser Security / Vulnerability

Cybersecurity researchers have disclosed a vulnerability in Anthropic’s Claude Google Chrome Extension that could have been exploited to trigger malicious prompts simply by visiting a web page.

The flaw “allowed any website to silently inject prompts into that assistant as if the user wrote them,” Koi Security researcher Oren Yomtov said in a report shared with The Hacker News. “No clicks, no permission prompts. Just visit a page, and an attacker completely controls your browser.”

The issue, codenamed ShadowPrompt, chains two underlying flaws:

  • An overly permissive origin allowlist in the extension that allowed any subdomain matching the pattern (*.claude.ai) to send a prompt to Claude for execution.
  • A document object model (DOM)-based cross-site scripting (XSS) vulnerability in an Arkose Labs CAPTCHA component hosted on “a-cdn.claude[.]ai.”

Specifically, the XSS vulnerability enables the execution of arbitrary JavaScript code in the context of “a-cdn.claude[.]ai.” A threat actor could leverage this behavior to inject JavaScript that issues a prompt to the Claude extension.

The extension, for its part, allows the prompt to land in Claude’s sidebar as if it’s a legitimate user request simply because it comes from an allow-listed domain.

“The attacker’s page embeds the vulnerable Arkose component in a hidden

Successful exploitation of this vulnerability could allow the adversary to steal sensitive data (e.g., access tokens), access conversation history with the AI agent, and even perform actions on behalf of the victim (e.g., sending emails impersonating them, asking for confidential data).

Following responsible disclosure on December 27, 2025, Anthropic deployed a patch to the Chrome extension (version 1.0.41) that enforces a strict origin check requiring an exact match to the domain “claude[.]ai.” Arkose Labs has since fixed the XSS flaw at its end as of February 19, 2026.

“The more capable AI browser assistants become, the more valuable they are as attack targets,” Koi said. “An extension that can navigate your browser, read your credentials, and send emails on your behalf is an autonomous agent. And the security of that agent is only as strong as the weakest origin in its trust boundary.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Which Brands Will Be Hardest Hit by FCC’s Foreign Router Ban? Here’s the List Which Brands Will Be Hardest Hit by FCC’s Foreign Router Ban? Here’s the List
Next Article Mamdani puts New York City government back on TikTok
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Qilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR Tools
Qilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR Tools
Computing
5 Android Smartphones More Powerful Than Nintendo Switch – BGR
5 Android Smartphones More Powerful Than Nintendo Switch – BGR
News
NASA shares Artemis II crew's iPhone shots from space
NASA shares Artemis II crew's iPhone shots from space
News
Many MediaTek MT76 WiFi Driver Improvements Coming For Linux 7.1
Many MediaTek MT76 WiFi Driver Improvements Coming For Linux 7.1
Computing

You Might also Like

Qilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR Tools
Computing

Qilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR Tools

5 Min Read
Many MediaTek MT76 WiFi Driver Improvements Coming For Linux 7.1
Computing

Many MediaTek MT76 WiFi Driver Improvements Coming For Linux 7.1

1 Min Read
Freshippo CEO announces sustained profitability after 50% surge in customer base · TechNode
Computing

Freshippo CEO announces sustained profitability after 50% surge in customer base · TechNode

2 Min Read
More deals, less cash: Africa’s exit problem
Computing

More deals, less cash: Africa’s exit problem

9 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?