Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Malicious Chrome MV3 Extension Steals TronLink Crypto
May 12, 2026
Microsoft Warns: MistralAI PyPI Package Injects Compromised Malicious
May 12, 2026
Claude Chrome Extension Flaw Steals Gmail & Drive Data
May 12, 2026
Home/Vulnerabilities/Claude Chrome Extension Flaw Steals Gmail & Drive Data
Vulnerabilities

Claude Chrome Extension Flaw Steals Gmail & Drive Data

A catastrophic vulnerability has been identified within the “Claude in Chrome” extension, according to recent research. This flaw allows attackers to weaponize an otherwise harmless, zero-permission...

Jennifer sherman
Jennifer sherman
May 12, 2026 3 Min Read
1 0

A catastrophic vulnerability has been identified within the “Claude in Chrome” extension, according to recent research. This flaw allows attackers to weaponize an otherwise harmless, zero-permission extension, enabling the complete hijacking of the trusted AI assistant.

Transform it into a malicious puppet that silently pillages private Gmail messages, restricted Google Drive documents, and secret GitHub repositories.

This terrifying blind spot exposes the dark side of the AI automation race, proving that when vendors recklessly stretch trust boundaries to speed things up, they leave our most sensitive digital vaults wide open to exploitation.

Trust Boundary Violation in Claude Chrome Extension(source : layerxsecurity )
Trust Boundary Violation in Claude Chrome Extension(source : Layerxsecurity )

Claude’s Chrome Extension Vulnerability

The root cause is a systemic trust boundary violation tied to the extension’s manifest file.

The extension uses the externally_connectable setting to communicate with the main claude.ai Large Language Model (LLM). However, it only verifies the origin of the request (claude.ai) rather than the actual execution context.

JavaScript running on the claude.ai page, including scripts injected by malicious extensions with no declared permissions, can execute privileged commands on Claude.

Because the script runs within the trusted origin, Chrome’s security model is bypassed, and the attacker inherits the capabilities of the trusted AI assistant.

To weaponize this flaw, researchers created a minimal proof-of-concept extension that successfully bypassed Claude’s built-in guardrails using two primary techniques:

  • Approval Looping: Claude enforces user confirmations for sensitive actions. Researchers bypassed this by programmatically forging user consent, repeatedly sending “Yes, proceed” to satisfy state-based confirmation prompts.
  • Perception Manipulation: Claude’s decision-making relies heavily on visible text and the Document Object Model (DOM) structure.
Bypass: Approval Looping (source : layerxsecurity )
Bypass: Approval Looping (source : Layerxsecurity )

Attackers dynamically modified the UI semantics, such as renaming a “Share” button to “Request feedback,” tricking the AI’s visual perception into executing restricted actions that it believed were benign.

Once hijacked, the AI acts as a “confused deputy.” LayerX demonstrated that attackers could extract private GitHub source code, share restricted Google Drive documents with external users, and summarize, forward, and delete a user’s recent Gmail messages.

Notably, this requires neither user interaction nor complex exploit chains.

LayerX reported the flaw to Anthropic on April 27, 2026. On May 6, 2026, Anthropic released version 1.0.70, which introduced explicit approval flows for standard browser actions.

However, researchers note this patch is incomplete because it focuses on a UI-based permission layer rather than fixing the underlying externally_connectable handler.

If the extension operates in “privileged” mode (Act without asking), the vulnerability remains fully exploitable.

Furthermore, attackers can abuse the side-panel initialization flow to force a separate privileged-mode session, bypassing the newly introduced security checks entirely.

To properly remediate this trust model failure, LayerX recommends implementing strict validation of external message senders rather than relying on UI-based symptoms.

Recommended architectural changes include:

  • Introducing extension-to-page authentication tokens, such as cryptographically signed requests, to verify sender identity.
  • Restricting externally_connectable settings to trusted extension IDs rather than relying broadly on origin URLs.
  • Binding user approvals strictly to specific actions using one-time tokens and non-replayable flows.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitPatchSecurityVulnerability

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

Critical PHP SOAP Flaws Enable Remote Code Execution Attacks

Next Post

Microsoft Warns: MistralAI PyPI Package Injects Compromised Malicious

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
TeamPCP Compromises Checkmarx Jenkins Compromised Plugin
May 12, 2026
Android Zero-Click Vulnerability Enables Remote Shell Access
May 12, 2026
TrickMo Android Malware Targets Banking & Wallet Apps
May 12, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us