Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms

February 11, 2026

CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog

February 11, 2026

US Court Hands Crypto Scammer 20 Years in $73m Case

February 11, 2026
Facebook X (Twitter) Instagram
Wednesday, February 11
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»New Zero-Click Flaw in Claude Extensions, Anthropic Declines Fix
News

New Zero-Click Flaw in Claude Extensions, Anthropic Declines Fix

Team-CWDBy Team-CWDFebruary 9, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A single Google Calendar event can silently compromise a system running Claude Desktop Extensions, according to security researchers at browser security provider LayerX.

In a new report published on February 9, LayerX, disclosed a new critical vulnerability affecting 50 Claude Desktop Extensions (DXT).

If exploited this flaw allows an attacker to perform remote code executions (RCE) on a system running a vulnerable extension, without needing for the victim to click on anything.

This issue was allocated a maximum-severity rating (CVSS of 10.0) and could impact over 10,000 active Claude DXT users.

Roy Paz, principal security researcher at LayerX, said his team reported the vulnerability to Anthropic, the company behind the Claude large language model (LLM)and associated services, including Claude DTX. However, Anthropic “decided not to fix it at this time,” Paz added

Claude DXT: Full Privileges on the Host System

Claude Desktop Extensions are different from traditional browser extensions. Like a typical Chrome browser extension, a Claude DXT offers a one-click installation process.

While a Chrome extension is a simple browser add-on comprising .crx packages, Claude DXT are Model Context Protocol (MCP) servers packaged and distributed through Anthropic’s extension marketplace. Each DXT is made up of a .mcpb bundle, which Paz likened to a .zip archive file, that includes the MCP server implementation code as well as a manifest defining the extension’s exposed functions.

The differences go even further in the authorizations granted to Claude DXT. While Chrome extensions run inside a tightly sandboxed browser environment and don’t have direct system access, Claude DXT execute without sandboxing and with full privileges on the host system, LayerX’s Paz noted.

As a result, Claud DXT can perform sensitive commands, such as:

  • Read arbitrary files
  • Execute system commands
  • Access stored credentials
  • Modify operating system settings

Claude DXT Vulnerability Leads to Malicious Code Execution

This vulnerability stems from how MCP-based systems like Claude DXT autonomously chain together different tools to fulfil user requests without enforcing proper security boundaries.

MCP allows Claude to dynamically select and combine external connectors, such as Google Calendar for reading events and local executors for running code, based on vague prompts.

For instance, when researchers told Claude to “check my latest events and take care of it,” the AI assistant interpreted “take care of it” as a justification to execute arbitrary instructions embedded in those events.

Paz said that an attacker could exploit such behavior by crafting a seemingly harmless calendar event containing malicious instructions that a Claude DXT will execute, which could lead to achieving full remote code execution on the victim’s system.  

Without safeguards, MCP treats data from low-risk sources (like a calendar) as trusted input for high-risk actions (like running local code), creating an unintended path for exploitation.

The Flaw Falls Outside Anthropic’s Threat Model

LayerX reported the vulnerability to Anthropic, which declined to take any actions, saying the flaw “falls outside our current threat model.”

“Claude Desktop’s MCP integration is designed as a local development tool that operates within the user’s own environment. Users explicitly configure and grant permissions to MCP servers they choose to run locally, and these servers have access to resources based on the user’s permissions,” said Anthropic.

“The scenario you’ve described involves the interaction between multiple MCP connectors that a user has intentionally installed and granted permission to run without permission prompts. Since users maintain full control over which MCP servers they enable and the permissions those servers have, the security boundary is defined by the user’s configuration choices and their system’s existing security controls.”

Despite this response, LayerX’s Paz​ said he allocated the flaw a maximum-severity rating (CVSS) of 10.0 based on two vulnerability severity benchmarks (CVSS versions 3.0 and 4.0) developed by the Forum of Incident Response and Security Team (FIRST).

Speaking to Infosecurity, he commented: “Exploits such as this one demonstrate the classic catch-22 of AI: to unlock the productivity benefits of AI, you need to give these tools deep access to sensitive data. But if any data is compromised as a result, the AI and model providers don’t see themselves responsible for the security of users using their products. This highlights the need for an AI ‘shared responsibility’ model where it is clear who is responsible for the different layers of security of AI tools.”

Infosecurity contacted Anthropic, but the company had not responded to a request for comment at the time of publication.

Image credits: yalicn / Thaspol Sangsee / Shutterstock

Read now: Malicious AI Agent Server Reportedly Steals Emails



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleOpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link
Next Article Two Connecticut Men Charged In Alleged $3m Gambling Fraud Scheme
Team-CWD
  • Website

Related Posts

News

North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms

February 11, 2026
News

CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog

February 11, 2026
News

US Court Hands Crypto Scammer 20 Years in $73m Case

February 11, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

When ‘hacking’ your game becomes a security risk

October 17, 2025

Top IRS scams to look out for in 2026

February 10, 2026

Look out for phony verification pages spreading malware

September 14, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.