Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vhw5-3g5m-8ggf

Опубликовано: 03 фев. 2026
Источник: github
Github: Прошло ревью
CVSS4: 7.1

Описание

Claude Code has a Domain Validation Bypass which Allows Automatic Requests to Attacker-Controlled Domains

Claude Code contained insufficient URL validation in its trusted domain verification mechanism for WebFetch requests. The application used a startsWith() function to validate trusted domains (e.g., docs.python.org, modelcontextprotocol.io), this could have enabled attackers to register domains like modelcontextprotocol.io.example.com that would pass validation. This could enable automatic requests to attacker-controlled domains without user consent, potentially leading to data exfiltration.

Users on standard Claude Code auto-update have received this fix already. Users performing manual updates are advised to update to the latest version.

Thank you to hackerone.com/47sid-praetorian for reporting this issue!

Пакеты

Наименование

@anthropic-ai/claude-code

npm
Затронутые версииВерсия исправления

< 1.0.111

1.0.111

EPSS

Процентиль: 12%
0.00041
Низкий

7.1 High

CVSS4

Дефекты

CWE-601

Связанные уязвимости

nvd
3 дня назад

Claude Code is an agentic coding tool. Prior to version 1.0.111, Claude Code contained insufficient URL validation in its trusted domain verification mechanism for WebFetch requests. The application used a startsWith() function to validate trusted domains (e.g., docs.python.org, modelcontextprotocol.io), this could have enabled attackers to register domains like modelcontextprotocol.io.example.com that would pass validation. This could enable automatic requests to attacker-controlled domains without user consent, potentially leading to data exfiltration. This issue has been patched in version 1.0.111.

EPSS

Процентиль: 12%
0.00041
Низкий

7.1 High

CVSS4

Дефекты

CWE-601