Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24052: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in anthropics claude-code

0
High
VulnerabilityCVE-2026-24052cvecve-2026-24052cwe-601
Published: Tue Feb 03 2026 (02/03/2026, 20:49:41 UTC)
Source: CVE Database V5
Vendor/Project: anthropics
Product: claude-code

Description

CVE-2026-24052 is a high-severity open redirect vulnerability in anthropics' Claude Code agentic coding tool prior to version 1. 0. 111. The flaw arises from improper URL validation using a startsWith() check, allowing attacker-controlled domains like modelcontextprotocol. io. example. com to bypass trusted domain verification. This can cause automatic WebFetch requests to malicious domains without user consent, potentially leading to data exfiltration. No authentication or privileges are required to exploit this vulnerability, but user interaction is needed. The issue has been patched in version 1.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/11/2026, 11:46:22 UTC

Technical Analysis

CVE-2026-24052 is an open redirect vulnerability classified under CWE-601 found in anthropics' Claude Code, an agentic coding tool designed to automate coding tasks. The vulnerability exists in versions prior to 1.0.111 due to insufficient validation of URLs in the trusted domain verification mechanism for WebFetch requests. Specifically, the application uses a simplistic startsWith() function to verify if a URL belongs to a trusted domain such as docs.python.org or modelcontextprotocol.io. This approach is flawed because it allows attacker-controlled domains that prepend the trusted domain as a subdomain suffix (e.g., modelcontextprotocol.io.example.com) to pass validation. Consequently, the application may automatically send requests to these malicious domains without explicit user consent. This behavior can be exploited to exfiltrate sensitive data or perform other malicious activities by redirecting traffic to attacker-controlled endpoints. The vulnerability does not require any authentication or privileges, but exploitation requires user interaction to trigger the WebFetch request. The CVSS v4.0 score is 7.1 (high severity), reflecting the network attack vector, low attack complexity, no privileges required, but user interaction needed, and high impact on confidentiality. The issue was publicly disclosed on February 3, 2026, and has been patched in version 1.0.111 of Claude Code. No known exploits have been reported in the wild to date.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially for those leveraging Claude Code in their software development or automation workflows. The automatic redirection to attacker-controlled domains can lead to unauthorized data exfiltration, potentially exposing sensitive intellectual property, credentials, or internal API data. This can undermine confidentiality and trust in automated coding tools. Given the high adoption of advanced coding assistants in European tech hubs, the risk of targeted exploitation is non-trivial. Additionally, organizations in regulated sectors such as finance, healthcare, and critical infrastructure may face compliance and reputational damage if sensitive data is leaked. The requirement for user interaction means phishing or social engineering could be used to trigger the exploit, increasing the attack surface. Although no active exploits are known, the vulnerability's characteristics make it a likely candidate for future exploitation, especially as attackers craft sophisticated supply chain or development environment attacks.

Mitigation Recommendations

European organizations using Claude Code should immediately upgrade to version 1.0.111 or later, where the vulnerability has been patched. Until upgrading is possible, organizations should implement strict network egress filtering to restrict WebFetch requests to only verified and necessary domains, preventing connections to suspicious subdomains. Security teams should audit and monitor WebFetch usage logs for anomalous or unexpected outbound requests. User training should emphasize caution when interacting with automated tools that perform network requests, highlighting the risk of open redirects. Additionally, organizations can implement runtime application self-protection (RASP) or web application firewalls (WAF) with custom rules to detect and block suspicious URL patterns resembling subdomain spoofing. Finally, integrating URL validation libraries that perform exact domain matching rather than prefix checks can prevent similar vulnerabilities in custom tools.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-20T22:30:11.778Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698261daf9fa50a62fdf39df

Added to database: 2/3/2026, 9:00:10 PM

Last enriched: 2/11/2026, 11:46:22 AM

Last updated: 3/21/2026, 6:33:05 AM

Views: 54

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses