Claude Code has a Domain Validation Bypass which Allows Automatic Requests to Attacker-Controlled Domains
Description
Claude Code is an agentic coding tool. Prior to version 1.0.111, Claude Code contained insufficient URL validation in its trusted domain verification mechanism for WebFetch requests. The application used a startsWith() function to validate trusted domains (e.g., docs.python.org, modelcontextprotocol.io), this could have enabled attackers to register domains like modelcontextprotocol.io.example.com that would pass validation. This could enable automatic requests to attacker-controlled domains without user consent, potentially leading to data exfiltration. This issue has been patched in version 1.0.111.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
@anthropic-ai/claude-codenpm | < 1.0.111 | 1.0.111 |
Affected products
1- Range: < 1.0.111
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-vhw5-3g5m-8ggfghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-24052ghsaADVISORY
- github.com/anthropics/claude-code/security/advisories/GHSA-vhw5-3g5m-8ggfghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.