Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24052: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in anthropics claude-code

0
High
VulnerabilityCVE-2026-24052cvecve-2026-24052cwe-601
Published: Tue Feb 03 2026 (02/03/2026, 20:49:41 UTC)
Source: CVE Database V5
Vendor/Project: anthropics
Product: claude-code

Description

CVE-2026-24052 is a high-severity open redirect vulnerability in anthropics' Claude Code agentic coding tool versions prior to 1. 0. 111. The flaw arises from improper URL validation using a startsWith() check on trusted domains, allowing attacker-controlled domains with similar prefixes to bypass validation. This can lead to automatic WebFetch requests to malicious domains without user consent, potentially enabling data exfiltration. The vulnerability requires no privileges but does need user interaction to trigger. It has been patched in version 1. 0. 111, and no known exploits are currently reported in the wild. European organizations using affected versions should prioritize updating to mitigate risks.

AI-Powered Analysis

AILast updated: 02/03/2026, 21:14:56 UTC

Technical Analysis

CVE-2026-24052 is an open redirect vulnerability classified under CWE-601 affecting anthropics' Claude Code, an agentic coding tool designed to automate coding tasks. The vulnerability stems from insufficient URL validation in the trusted domain verification mechanism used for WebFetch requests. Specifically, the application used a naive startsWith() function to verify if a URL belonged to a trusted domain such as docs.python.org or modelcontextprotocol.io. This approach allowed attacker-controlled domains that prefix the trusted domain string, for example, modelcontextprotocol.io.example.com, to bypass validation checks. Consequently, the application could be tricked into making automatic HTTP requests to malicious domains without explicit user consent. Such behavior can lead to data exfiltration if sensitive information is included in these requests or responses. The vulnerability does not require any privileges or authentication but does require user interaction to trigger the WebFetch request. The CVSS 4.0 score of 7.1 reflects a high severity due to the network attack vector, low complexity, no privileges required, and high confidentiality impact. The issue was addressed and patched in Claude Code version 1.0.111 by improving the domain validation logic to correctly verify trusted domains and prevent prefix-based bypasses. No known exploits have been reported in the wild as of the publication date, but the vulnerability poses a significant risk if exploited.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized data exfiltration through automated requests to attacker-controlled domains, compromising sensitive coding or project data handled by Claude Code. Since Claude Code is an agentic coding tool, it may have access to proprietary source code, internal APIs, or confidential project information. Exploitation could result in leakage of intellectual property or sensitive development data, potentially damaging competitive advantage and violating data protection regulations such as GDPR. The automatic nature of the requests means that users might be unaware of the data leakage, increasing the risk of unnoticed breaches. Additionally, if attacker domains are used for phishing or malware delivery, it could further compromise organizational security. The requirement for user interaction limits mass exploitation but targeted attacks against developers or DevOps teams are plausible. The impact on availability and integrity is minimal, but confidentiality is significantly affected.

Mitigation Recommendations

European organizations using Claude Code should immediately upgrade to version 1.0.111 or later where the vulnerability is patched. Until upgrade, restrict or monitor WebFetch requests made by Claude Code to untrusted domains through network-level controls such as web proxies or firewall rules that enforce domain whitelisting. Implement strict domain validation and URL filtering policies in internal tools and workflows that integrate with Claude Code. Educate developers and users about the risks of interacting with untrusted URLs or domains, especially those resembling trusted domains with additional prefixes or subdomains. Conduct regular code audits and penetration testing focusing on URL validation logic in agentic tools. Employ runtime monitoring to detect unusual outbound HTTP requests from Claude Code processes. Finally, maintain an incident response plan to quickly address any suspected data exfiltration events.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-20T22:30:11.778Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698261daf9fa50a62fdf39df

Added to database: 2/3/2026, 9:00:10 PM

Last enriched: 2/3/2026, 9:14:56 PM

Last updated: 2/3/2026, 11:04:01 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats