CVE-2026-24052: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in anthropics claude-code
CVE-2026-24052 is a high-severity open redirect vulnerability in anthropics' Claude Code agentic coding tool prior to version 1. 0. 111. The flaw arises from improper URL validation using a startsWith() check, allowing attacker-controlled domains like modelcontextprotocol. io. example. com to bypass trusted domain verification. This can cause automatic WebFetch requests to malicious domains without user consent, potentially leading to data exfiltration. No authentication or privileges are required to exploit this vulnerability, but user interaction is needed. The issue has been patched in version 1.
AI Analysis
Technical Summary
CVE-2026-24052 is an open redirect vulnerability classified under CWE-601 found in anthropics' Claude Code, an agentic coding tool designed to automate coding tasks. The vulnerability exists in versions prior to 1.0.111 due to insufficient validation of URLs in the trusted domain verification mechanism for WebFetch requests. Specifically, the application uses a simplistic startsWith() function to verify if a URL belongs to a trusted domain such as docs.python.org or modelcontextprotocol.io. This approach is flawed because it allows attacker-controlled domains that prepend the trusted domain as a subdomain suffix (e.g., modelcontextprotocol.io.example.com) to pass validation. Consequently, the application may automatically send requests to these malicious domains without explicit user consent. This behavior can be exploited to exfiltrate sensitive data or perform other malicious activities by redirecting traffic to attacker-controlled endpoints. The vulnerability does not require any authentication or privileges, but exploitation requires user interaction to trigger the WebFetch request. The CVSS v4.0 score is 7.1 (high severity), reflecting the network attack vector, low attack complexity, no privileges required, but user interaction needed, and high impact on confidentiality. The issue was publicly disclosed on February 3, 2026, and has been patched in version 1.0.111 of Claude Code. No known exploits have been reported in the wild to date.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially for those leveraging Claude Code in their software development or automation workflows. The automatic redirection to attacker-controlled domains can lead to unauthorized data exfiltration, potentially exposing sensitive intellectual property, credentials, or internal API data. This can undermine confidentiality and trust in automated coding tools. Given the high adoption of advanced coding assistants in European tech hubs, the risk of targeted exploitation is non-trivial. Additionally, organizations in regulated sectors such as finance, healthcare, and critical infrastructure may face compliance and reputational damage if sensitive data is leaked. The requirement for user interaction means phishing or social engineering could be used to trigger the exploit, increasing the attack surface. Although no active exploits are known, the vulnerability's characteristics make it a likely candidate for future exploitation, especially as attackers craft sophisticated supply chain or development environment attacks.
Mitigation Recommendations
European organizations using Claude Code should immediately upgrade to version 1.0.111 or later, where the vulnerability has been patched. Until upgrading is possible, organizations should implement strict network egress filtering to restrict WebFetch requests to only verified and necessary domains, preventing connections to suspicious subdomains. Security teams should audit and monitor WebFetch usage logs for anomalous or unexpected outbound requests. User training should emphasize caution when interacting with automated tools that perform network requests, highlighting the risk of open redirects. Additionally, organizations can implement runtime application self-protection (RASP) or web application firewalls (WAF) with custom rules to detect and block suspicious URL patterns resembling subdomain spoofing. Finally, integrating URL validation libraries that perform exact domain matching rather than prefix checks can prevent similar vulnerabilities in custom tools.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Ireland
CVE-2026-24052: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in anthropics claude-code
Description
CVE-2026-24052 is a high-severity open redirect vulnerability in anthropics' Claude Code agentic coding tool prior to version 1. 0. 111. The flaw arises from improper URL validation using a startsWith() check, allowing attacker-controlled domains like modelcontextprotocol. io. example. com to bypass trusted domain verification. This can cause automatic WebFetch requests to malicious domains without user consent, potentially leading to data exfiltration. No authentication or privileges are required to exploit this vulnerability, but user interaction is needed. The issue has been patched in version 1.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-24052 is an open redirect vulnerability classified under CWE-601 found in anthropics' Claude Code, an agentic coding tool designed to automate coding tasks. The vulnerability exists in versions prior to 1.0.111 due to insufficient validation of URLs in the trusted domain verification mechanism for WebFetch requests. Specifically, the application uses a simplistic startsWith() function to verify if a URL belongs to a trusted domain such as docs.python.org or modelcontextprotocol.io. This approach is flawed because it allows attacker-controlled domains that prepend the trusted domain as a subdomain suffix (e.g., modelcontextprotocol.io.example.com) to pass validation. Consequently, the application may automatically send requests to these malicious domains without explicit user consent. This behavior can be exploited to exfiltrate sensitive data or perform other malicious activities by redirecting traffic to attacker-controlled endpoints. The vulnerability does not require any authentication or privileges, but exploitation requires user interaction to trigger the WebFetch request. The CVSS v4.0 score is 7.1 (high severity), reflecting the network attack vector, low attack complexity, no privileges required, but user interaction needed, and high impact on confidentiality. The issue was publicly disclosed on February 3, 2026, and has been patched in version 1.0.111 of Claude Code. No known exploits have been reported in the wild to date.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially for those leveraging Claude Code in their software development or automation workflows. The automatic redirection to attacker-controlled domains can lead to unauthorized data exfiltration, potentially exposing sensitive intellectual property, credentials, or internal API data. This can undermine confidentiality and trust in automated coding tools. Given the high adoption of advanced coding assistants in European tech hubs, the risk of targeted exploitation is non-trivial. Additionally, organizations in regulated sectors such as finance, healthcare, and critical infrastructure may face compliance and reputational damage if sensitive data is leaked. The requirement for user interaction means phishing or social engineering could be used to trigger the exploit, increasing the attack surface. Although no active exploits are known, the vulnerability's characteristics make it a likely candidate for future exploitation, especially as attackers craft sophisticated supply chain or development environment attacks.
Mitigation Recommendations
European organizations using Claude Code should immediately upgrade to version 1.0.111 or later, where the vulnerability has been patched. Until upgrading is possible, organizations should implement strict network egress filtering to restrict WebFetch requests to only verified and necessary domains, preventing connections to suspicious subdomains. Security teams should audit and monitor WebFetch usage logs for anomalous or unexpected outbound requests. User training should emphasize caution when interacting with automated tools that perform network requests, highlighting the risk of open redirects. Additionally, organizations can implement runtime application self-protection (RASP) or web application firewalls (WAF) with custom rules to detect and block suspicious URL patterns resembling subdomain spoofing. Finally, integrating URL validation libraries that perform exact domain matching rather than prefix checks can prevent similar vulnerabilities in custom tools.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-20T22:30:11.778Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698261daf9fa50a62fdf39df
Added to database: 2/3/2026, 9:00:10 PM
Last enriched: 2/11/2026, 11:46:22 AM
Last updated: 3/21/2026, 6:33:05 AM
Views: 54
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.