Vulnerabilities

CVE in Claude Chrome Extension Allows Plugin Hijacking

May 9, 2026 00:06 · 10 min read
CVE in Claude Chrome Extension Allows Plugin Hijacking

Claude Chrome Extension Vulnerability

As businesses and governments increasingly rely on AI agents to access the internet and perform complex tasks, researchers have discovered a serious flaw in the Chrome extension for Anthropic's Claude AI model. The vulnerability, identified by browser security firm LayerX, allows any other plugin to embed hidden instructions that can take over the agent.

According to LayerX senior researcher Aviad Gispan, the flaw stems from an instruction in the extension's code that allows any script running in the origin browser to communicate with Claude's large language model (LLM) without verifying who is running the script. This means that any extension can invoke a content script and issue commands to the Claude extension, potentially allowing attackers to extract files, send emails, and surveil user activity.

Exploiting the Flaw

Gispan demonstrated the exploit by modifying Claude's user interface to remove labels and indicators around sensitive information, such as passwords and sharing feedback. He then prompted Claude to share files with an outside server, effectively breaking Chrome's extension security and creating a privilege escalation primitive across extensions.

The vulnerability is particularly concerning because Claude relies on text, user interface semantics, and interpretation of screenshots to make decisions, all of which can be controlled by an attacker on the input side. This means that cybersecurity defenders may have nothing obviously malicious to detect, and the model can be prompted to cover its tracks by deleting emails and other evidence of its actions.

Industry Response

Ax Sharma, Head of Research at Manifold Security, called the vulnerability "a useful demonstration of why monitoring AI agents at the prompt layer is fundamentally insufficient." Sharma noted that the most sophisticated part of the attack is not the injection itself, but the manipulation of the agent's perceived environment to produce actions that look legitimate from the inside.

LayerX reported the flaw to Anthropic on April 27, but the company only issued a "partial" fix to the problem. According to LayerX, Anthropic responded a day later to say that the bug was a duplicate of another vulnerability already being addressed in a future update. However, Gispan said that he was still able to take over Claude's agent in some scenarios, even after the fix was issued on May 6.

Conclusion

The vulnerability in the Claude Chrome extension highlights the need for more robust security measures to protect AI agents from exploitation. As AI becomes increasingly integrated into our daily lives, it is essential that we prioritize the development of defenses against these types of threats. The industry must build defenses that can detect and prevent the manipulation of AI agents, rather than simply relying on monitoring at the prompt layer.


Source: CyberScoop

Source: CyberScoop

Powered by ZeroBot

Protect your website from bots, scrapers, and automated threats.

Try ZeroBot Free