CVE-2026-24052
📋 TL;DR
CVE-2026-24052 is a URL validation bypass vulnerability in Claude Code's trusted domain verification. Attackers could register malicious subdomains that pass validation (e.g., modelcontextprotocol.io.example.com), enabling automatic requests to attacker-controlled domains without user consent. This affects all Claude Code users prior to version 1.0.111.
💻 Affected Systems
- Claude Code
📦 What is this software?
Claude Code by Anthropic
⚠️ Risk & Real-World Impact
Worst Case
Complete data exfiltration from Claude Code sessions, including sensitive code, API keys, and proprietary information sent to attacker-controlled servers.
Likely Case
Targeted attacks stealing specific data from compromised Claude Code instances, potentially leading to credential theft or intellectual property loss.
If Mitigated
Limited impact with proper network segmentation and egress filtering, though validation bypass remains possible.
🎯 Exploit Status
Exploitation requires user interaction with Claude Code, but domain registration and attack setup are straightforward.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.0.111
Vendor Advisory: https://github.com/anthropics/claude-code/security/advisories/GHSA-vhw5-3g5m-8ggf
Restart Required: Yes
Instructions:
1. Stop Claude Code service. 2. Update to version 1.0.111 or later via package manager or direct download. 3. Restart Claude Code service. 4. Verify the update was successful.
🔧 Temporary Workarounds
Network Egress Filtering
allBlock outbound connections to non-essential domains from Claude Code instances
Domain Whitelist Enforcement
allConfigure firewall or proxy to only allow connections to explicitly trusted domains
🧯 If You Can't Patch
- Isolate Claude Code instances in restricted network segments with limited egress
- Monitor outbound connections for suspicious domains and implement alerting
🔍 How to Verify
Check if Vulnerable:
Check Claude Code version. If version is less than 1.0.111, the system is vulnerable.
Check Version:
claude-code --version or check package manager version
Verify Fix Applied:
After updating, verify version is 1.0.111 or higher and test that subdomain bypass attempts fail.
📡 Detection & Monitoring
Log Indicators:
- Unusual outbound HTTP requests from Claude Code
- Requests to suspicious domains containing trusted domain names as substrings
Network Indicators:
- Outbound connections to domains containing trusted domain names as subdomains
- Unexpected data exfiltration patterns
SIEM Query:
source="claude-code" AND (destination_domain="*.modelcontextprotocol.io.*" OR destination_domain="*.docs.python.org.*")