Description
Claude Code is an agentic coding tool. Prior to version 1.0.111, Claude Code contained insufficient URL validation in its trusted domain verification mechanism for WebFetch requests. The application used a startsWith() function to validate trusted domains (e.g., docs.python.org, modelcontextprotocol.io), this could have enabled attackers to register domains like modelcontextprotocol.io.example.com that would pass validation. This could enable automatic requests to attacker-controlled domains without user consent, potentially leading to data exfiltration. This issue has been patched in version 1.0.111.
Published: 2026-02-03
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized external requests enabling data exfiltration
Action: Immediate Patch
AI Analysis

Impact

Claude Code, prior to version 1.0.111, relied on startsWith() logic to validate trusted domains for WebFetch requests. This allowed attackers to register domains that prefixed a legitimate domain (e.g. modelcontextprotocol.io.example.com), causing the tool to treat them as trusted and automatically send WebFetch requests to them without user consent. Such automatic outbound calls could lead to data exfiltration or malicious payload delivery, representing a significant confidentiality risk.

Affected Systems

Anthropic’s Claude Code product, versions earlier than 1.0.111, are affected. The vulnerability exists in all binaries that perform WebFetch requests before the patched version.

Risk and Exploitability

The flaw carries a CVSS Score of 7.1, categorizing it as high impact, yet the EPSS score is below 1 %, indicating a low probability of active exploitation. The vulnerability is not listed in CISA’s KEV catalog. Exploitation requires the attacker to trigger a WebFetch request from within the tool, so ordinary users are not directly exposed, but an attacker who can manipulate the tool or its inputs can force automatic traffic to attacker‑controlled domains. Given the potential for data leakage, the risk remains significant despite the low exploitation probability.

Generated by OpenCVE AI on April 18, 2026 at 00:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Claude Code to version 1.0.111 or later to apply the formal fix.
  • After upgrading, audit outbound traffic from Claude Code for unexpected connections to external domains.
  • If the upgrade cannot be performed immediately, disable or restrict the WebFetch feature, or modify the trusted domain list to include only exact matches.

Generated by OpenCVE AI on April 18, 2026 at 00:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-vhw5-3g5m-8ggf Claude Code has a Domain Validation Bypass which Allows Automatic Requests to Attacker-Controlled Domains
History

Fri, 06 Feb 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Anthropic
Anthropic claude Code
CPEs cpe:2.3:a:anthropic:claude_code:*:*:*:*:*:node.js:*:*
Vendors & Products Anthropic
Anthropic claude Code
Metrics cvssV3_1

{'score': 7.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N'}


Wed, 04 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Anthropics
Anthropics claude Code
Vendors & Products Anthropics
Anthropics claude Code

Tue, 03 Feb 2026 21:00:00 +0000

Type Values Removed Values Added
Description Claude Code is an agentic coding tool. Prior to version 1.0.111, Claude Code contained insufficient URL validation in its trusted domain verification mechanism for WebFetch requests. The application used a startsWith() function to validate trusted domains (e.g., docs.python.org, modelcontextprotocol.io), this could have enabled attackers to register domains like modelcontextprotocol.io.example.com that would pass validation. This could enable automatic requests to attacker-controlled domains without user consent, potentially leading to data exfiltration. This issue has been patched in version 1.0.111.
Title Claude Code has a Domain Validation Bypass which Allows Automatic Requests to Attacker-Controlled Domains
Weaknesses CWE-601
References
Metrics cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Anthropic Claude Code
Anthropics Claude Code
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-04T20:00:11.786Z

Reserved: 2026-01-20T22:30:11.778Z

Link: CVE-2026-24052

cve-icon Vulnrichment

Updated: 2026-02-04T20:00:07.760Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-03T21:16:13.073

Modified: 2026-02-06T20:28:53.673

Link: CVE-2026-24052

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T00:15:31Z

Weaknesses