CVE-2026-24052: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in anthropics claude-code
CVE-2026-24052 is a high-severity open redirect vulnerability in anthropics' Claude Code agentic coding tool versions prior to 1. 0. 111. The flaw arises from improper URL validation using a startsWith() check on trusted domains, allowing attacker-controlled domains with similar prefixes to bypass validation. This can lead to automatic WebFetch requests to malicious domains without user consent, potentially enabling data exfiltration. The vulnerability requires no privileges but does need user interaction to trigger. It has been patched in version 1. 0. 111, and no known exploits are currently reported in the wild. European organizations using affected versions should prioritize updating to mitigate risks.
AI Analysis
Technical Summary
CVE-2026-24052 is an open redirect vulnerability classified under CWE-601 affecting anthropics' Claude Code, an agentic coding tool designed to automate coding tasks. The vulnerability stems from insufficient URL validation in the trusted domain verification mechanism used for WebFetch requests. Specifically, the application used a naive startsWith() function to verify if a URL belonged to a trusted domain such as docs.python.org or modelcontextprotocol.io. This approach allowed attacker-controlled domains that prefix the trusted domain string, for example, modelcontextprotocol.io.example.com, to bypass validation checks. Consequently, the application could be tricked into making automatic HTTP requests to malicious domains without explicit user consent. Such behavior can lead to data exfiltration if sensitive information is included in these requests or responses. The vulnerability does not require any privileges or authentication but does require user interaction to trigger the WebFetch request. The CVSS 4.0 score of 7.1 reflects a high severity due to the network attack vector, low complexity, no privileges required, and high confidentiality impact. The issue was addressed and patched in Claude Code version 1.0.111 by improving the domain validation logic to correctly verify trusted domains and prevent prefix-based bypasses. No known exploits have been reported in the wild as of the publication date, but the vulnerability poses a significant risk if exploited.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized data exfiltration through automated requests to attacker-controlled domains, compromising sensitive coding or project data handled by Claude Code. Since Claude Code is an agentic coding tool, it may have access to proprietary source code, internal APIs, or confidential project information. Exploitation could result in leakage of intellectual property or sensitive development data, potentially damaging competitive advantage and violating data protection regulations such as GDPR. The automatic nature of the requests means that users might be unaware of the data leakage, increasing the risk of unnoticed breaches. Additionally, if attacker domains are used for phishing or malware delivery, it could further compromise organizational security. The requirement for user interaction limits mass exploitation but targeted attacks against developers or DevOps teams are plausible. The impact on availability and integrity is minimal, but confidentiality is significantly affected.
Mitigation Recommendations
European organizations using Claude Code should immediately upgrade to version 1.0.111 or later where the vulnerability is patched. Until upgrade, restrict or monitor WebFetch requests made by Claude Code to untrusted domains through network-level controls such as web proxies or firewall rules that enforce domain whitelisting. Implement strict domain validation and URL filtering policies in internal tools and workflows that integrate with Claude Code. Educate developers and users about the risks of interacting with untrusted URLs or domains, especially those resembling trusted domains with additional prefixes or subdomains. Conduct regular code audits and penetration testing focusing on URL validation logic in agentic tools. Employ runtime monitoring to detect unusual outbound HTTP requests from Claude Code processes. Finally, maintain an incident response plan to quickly address any suspected data exfiltration events.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Ireland
CVE-2026-24052: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in anthropics claude-code
Description
CVE-2026-24052 is a high-severity open redirect vulnerability in anthropics' Claude Code agentic coding tool versions prior to 1. 0. 111. The flaw arises from improper URL validation using a startsWith() check on trusted domains, allowing attacker-controlled domains with similar prefixes to bypass validation. This can lead to automatic WebFetch requests to malicious domains without user consent, potentially enabling data exfiltration. The vulnerability requires no privileges but does need user interaction to trigger. It has been patched in version 1. 0. 111, and no known exploits are currently reported in the wild. European organizations using affected versions should prioritize updating to mitigate risks.
AI-Powered Analysis
Technical Analysis
CVE-2026-24052 is an open redirect vulnerability classified under CWE-601 affecting anthropics' Claude Code, an agentic coding tool designed to automate coding tasks. The vulnerability stems from insufficient URL validation in the trusted domain verification mechanism used for WebFetch requests. Specifically, the application used a naive startsWith() function to verify if a URL belonged to a trusted domain such as docs.python.org or modelcontextprotocol.io. This approach allowed attacker-controlled domains that prefix the trusted domain string, for example, modelcontextprotocol.io.example.com, to bypass validation checks. Consequently, the application could be tricked into making automatic HTTP requests to malicious domains without explicit user consent. Such behavior can lead to data exfiltration if sensitive information is included in these requests or responses. The vulnerability does not require any privileges or authentication but does require user interaction to trigger the WebFetch request. The CVSS 4.0 score of 7.1 reflects a high severity due to the network attack vector, low complexity, no privileges required, and high confidentiality impact. The issue was addressed and patched in Claude Code version 1.0.111 by improving the domain validation logic to correctly verify trusted domains and prevent prefix-based bypasses. No known exploits have been reported in the wild as of the publication date, but the vulnerability poses a significant risk if exploited.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized data exfiltration through automated requests to attacker-controlled domains, compromising sensitive coding or project data handled by Claude Code. Since Claude Code is an agentic coding tool, it may have access to proprietary source code, internal APIs, or confidential project information. Exploitation could result in leakage of intellectual property or sensitive development data, potentially damaging competitive advantage and violating data protection regulations such as GDPR. The automatic nature of the requests means that users might be unaware of the data leakage, increasing the risk of unnoticed breaches. Additionally, if attacker domains are used for phishing or malware delivery, it could further compromise organizational security. The requirement for user interaction limits mass exploitation but targeted attacks against developers or DevOps teams are plausible. The impact on availability and integrity is minimal, but confidentiality is significantly affected.
Mitigation Recommendations
European organizations using Claude Code should immediately upgrade to version 1.0.111 or later where the vulnerability is patched. Until upgrade, restrict or monitor WebFetch requests made by Claude Code to untrusted domains through network-level controls such as web proxies or firewall rules that enforce domain whitelisting. Implement strict domain validation and URL filtering policies in internal tools and workflows that integrate with Claude Code. Educate developers and users about the risks of interacting with untrusted URLs or domains, especially those resembling trusted domains with additional prefixes or subdomains. Conduct regular code audits and penetration testing focusing on URL validation logic in agentic tools. Employ runtime monitoring to detect unusual outbound HTTP requests from Claude Code processes. Finally, maintain an incident response plan to quickly address any suspected data exfiltration events.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-20T22:30:11.778Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698261daf9fa50a62fdf39df
Added to database: 2/3/2026, 9:00:10 PM
Last enriched: 2/3/2026, 9:14:56 PM
Last updated: 2/3/2026, 11:04:01 PM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1812: Path Traversal in bolo-blog bolo-solo
MediumCVE-2026-24514: CWE-770 Allocation of Resources Without Limits or Throttling in Kubernetes ingress-nginx
MediumCVE-2026-24513: CWE-754 Improper Check for Unusual or Exceptional Conditions in Kubernetes ingress-nginx
LowCVE-2026-24512: CWE-20 Improper Input Validation in Kubernetes ingress-nginx
HighCVE-2026-1755: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in themeisle Menu Icons by ThemeIsle
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.