CVE-2026-24052
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-02-03

Last updated on: 2026-02-06

Assigner: GitHub, Inc.

Description
Claude Code is an agentic coding tool. Prior to version 1.0.111, Claude Code contained insufficient URL validation in its trusted domain verification mechanism for WebFetch requests. The application used a startsWith() function to validate trusted domains (e.g., docs.python.org, modelcontextprotocol.io), this could have enabled attackers to register domains like modelcontextprotocol.io.example.com that would pass validation. This could enable automatic requests to attacker-controlled domains without user consent, potentially leading to data exfiltration. This issue has been patched in version 1.0.111.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-03
Last Modified
2026-02-06
Generated
2026-05-07
AI Q&A
2026-02-03
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
anthropic claude_code to 1.0.111 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-601 The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': 'CVE-2026-24052 is a high-severity vulnerability in the @anthropic-ai/claude-code software versions prior to 1.0.111. The issue stems from insufficient URL validation in the trusted domain verification mechanism used for WebFetch requests. The application used a startsWith() function to check if a URL belonged to trusted domains like "docs.python.org" or "modelcontextprotocol.io". However, this method allowed attackers to register malicious domains such as "modelcontextprotocol.io.example.com" that would incorrectly pass the validation.'}, {'type': 'paragraph', 'content': 'This flaw enables automatic requests to attacker-controlled domains without user consent, potentially leading to unauthorized data exfiltration. The vulnerability can be exploited remotely, requires no privileges or user interaction, and has low attack complexity. It is classified under CWE-20 (Improper Input Validation) and CWE-601 (URL Redirection to Untrusted Site, or Open Redirect). The issue was fixed in version 1.0.111.'}] [1]


How can this vulnerability impact me? :

[{'type': 'paragraph', 'content': "This vulnerability can lead to automatic requests being sent to attacker-controlled domains without the user's consent. As a result, sensitive data could be exfiltrated from the affected system, causing a high confidentiality impact."}, {'type': 'paragraph', 'content': 'There is no impact on the integrity or availability of the system, but the unauthorized data leakage could compromise user privacy and security.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, you should upgrade the @anthropic-ai/claude-code software to version 1.0.111 or later, where the issue has been patched.

Users relying on automatic updates have likely already received the patch, but manual updaters should promptly apply the update to prevent exploitation.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability could lead to unauthorized data exfiltration by enabling automatic requests to attacker-controlled domains without user consent.

Such unauthorized data leakage may impact compliance with data protection regulations like GDPR and HIPAA, which require strict controls over personal and sensitive data to prevent unauthorized disclosure.

Therefore, if exploited, this vulnerability could result in violations of these standards due to potential confidentiality breaches.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability arises from insufficient URL validation in the trusted domain verification mechanism of Claude Code versions prior to 1.0.111. Detection involves identifying if your system is running a vulnerable version of the @anthropic-ai/claude-code software.'}, {'type': 'paragraph', 'content': 'To detect exploitation attempts on your network, you can monitor outgoing WebFetch requests that target suspicious domains resembling trusted domains but with additional subdomains, such as domains ending with trusted domains plus extra labels (e.g., modelcontextprotocol.io.example.com).'}, {'type': 'paragraph', 'content': 'Suggested commands include searching logs or network traffic for requests to domains that start with trusted domains but have additional prefixes or suffixes. For example, using command-line tools like grep or network monitoring tools:'}, {'type': 'list_item', 'content': "grep -iE 'modelcontextprotocol\\.io\\.|docs\\.python\\.org\\.' /path/to/logs"}, {'type': 'list_item', 'content': "tcpdump -i any -nn -s 0 -A 'dst host modelcontextprotocol.io or dst host docs.python.org' | grep -i 'modelcontextprotocol.io.'"}, {'type': 'paragraph', 'content': 'Additionally, verify the installed version of Claude Code to ensure it is at least version 1.0.111 or later, as earlier versions are vulnerable.'}, {'type': 'list_item', 'content': 'Check version with: npm list @anthropic-ai/claude-code or equivalent package manager commands.'}] [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart