Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Claude Desktop Extensions Vulnerable to Web-Based Prompt Injection
News

Claude Desktop Extensions Vulnerable to Web-Based Prompt Injection

Team-CWDBy Team-CWDNovember 5, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Researchers at Koi Security have found that three of Anthropic’s official extensions for Claude Desktop were vulnerable to prompt injection.

The vulnerabilities, reported through Anthropic’s HackerOne program on July 3 and verified as high severity (CVSS 8.9), affected the Chrome, iMessage and Apple Notes connectors.

These extensions are packaged Model Context Protocol (MCP) servers available for download from Anthropic’s marketplace. They allow Claude, the underlying large language model (LLM) which all Anthropic tools rely on, to act on behalf of the user using the web and applications they connect it with.

At first, these extensions look very similar to browser extensions, such as Chrome extensions, providing that same one-click install experience.

Unsanitized Command Injection in Unsandboxed Extensions

While Chrome extensions run in a sandboxed browser process, Claude Desktop extensions run fully unsandboxed on the user’s device, with full system permissions.

“That means they can read any file, execute any command, access credentials and modify system settings. They’re not lightweight plugins – they’re privileged executors bridging Claude’s AI model and your operating system,” the Koi Security researchers wrote in a November 5 report.

The vulnerabilities affecting the three extensions are due to unsanitized command injection, which could turn any benign question to Claude into remote code execution (RCE) on a machine if a malicious actor manages to craft content that get accessed by Claude Desktop.

The assistant, acting in good faith, executes malicious commands because it believes it’s following legitimate instructions.

The attacker could thus be able to collect key information, such as SSH keys, AWS credentials or browser passwords.

These vulnerabilities were fully fixed by Anthropic in version 0.1.9. These fixes were verified by Koi Security on September 19.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleWSUS Exploited, LockBit 5.0 Returns, Telegram Backdoor, F5 Breach Widens
Next Article SideWinder Adopts New ClickOnce-Based Attack Chain Targeting South Asian Diplomats
Team-CWD
  • Website

Related Posts

News

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
News

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
News

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

How cybercriminals are targeting content creators

November 26, 2025

What is it, and how do I get it off my device?

September 11, 2025

The hidden risks of browser extensions – and how to avoid them

September 13, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.