ShadowPrompt: How a Zero-Click Vulnerability in Claude's Chrome Extension Could Hijack Your Browser
A zero-click vulnerability in Anthropic's Claude Chrome extension allowed any website to silently inject prompts and steal sensitive data. Here's what happened, how it worked, and what it means for your AI tool governance.
TL;DR
| What You Need to Know | Details |
|---|---|
| What happened | A zero-click vulnerability chain in Anthropic's Claude Chrome extension allowed any website to silently inject prompts into the AI assistant |
| Who was affected | All 3+ million users running the extension prior to version 1.0.41 |
| How it worked | Attackers chained an overly permissive origin allowlist with a DOM-based XSS in a third-party CAPTCHA component |
| What could be stolen | Gmail access tokens, Google Drive files, chat history, and the ability to send emails as the victim |
| Is it fixed? | Yes. Update to extension version 1.0.41 or higher |
| Compliance angle | Browser extensions are third-party software. SOC 2 and ISO 27001 require you to assess and govern them |
Quick Answer: ShadowPrompt was a critical vulnerability in the Claude Chrome extension that let any malicious website inject arbitrary prompts into Claude, with zero user interaction. The attacker could then exfiltrate sensitive data, steal authentication tokens, and impersonate the victim. Anthropic patched it within three weeks of disclosure. The incident is a clear reminder that AI browser extensions need the same governance and vetting as any other third-party tool in your stack.
In March 2026, security researchers at Koi Security published a detailed writeup of a vulnerability they named ShadowPrompt. The flaw affected Anthropic's Claude Chrome extension, which has over 3 million users, and could be exploited by any website without a single click from the victim.
No permission prompts. No suspicious pop-ups. Just visit a page, and an attacker takes full control of your AI assistant.
This post breaks down the technical attack chain, explains why it matters for organizations adopting AI tools, and outlines the specific steps you should take to protect your team.
What Is ShadowPrompt?
ShadowPrompt is a zero-click prompt injection vulnerability that chained two separate security flaws to achieve silent, remote exploitation of the Claude Chrome extension.
The name captures what made it dangerous: an attacker could shadow the user's interaction with Claude by injecting hidden prompts, turning the AI assistant into an unwitting tool for data theft.
Flaw 1: Overly Permissive Origin Allowlist
The Claude Chrome extension used a messaging API to receive instructions from the Claude web interface. To verify that messages came from a trusted source, it checked the sender's origin against an allowlist.
The problem: the allowlist accepted any subdomain matching *.claude.ai, not just the primary claude.ai domain. This meant that any page hosted on a subdomain of claude.ai could send prompt execution commands to the extension.
Flaw 2: DOM-Based XSS in a Third-Party CAPTCHA
Anthropic used Arkose Labs for CAPTCHA challenges, hosted at a-cdn.claude.ai. This component had two issues:
- It accepted
postMessageevents from any origin without validation - It rendered user-controlled data as raw HTML using React's
dangerouslySetInnerHTMLwithout sanitization
An attacker could inject a payload like <img src=x onerror="..."> to execute arbitrary JavaScript within the a-cdn.claude.ai origin, which the extension's allowlist already trusted.
The Attack Chain in Practice
Here's how the full exploit worked, step by step:
- Victim visits a malicious website (or a legitimate site with injected ads/scripts)
- The site embeds a hidden iframe pointing to the vulnerable Arkose CAPTCHA component on
a-cdn.claude.ai - The attacker sends a
postMessagewith an XSS payload to the iframe - The CAPTCHA component renders the payload, executing attacker-controlled JavaScript in the
a-cdn.claude.aicontext - The injected script sends a message to the Claude extension:
chrome.runtime.sendMessage('extension_id', {type: 'onboarding_task', payload: {prompt: 'ATTACKER_PROMPT'}}) - The extension validates the origin as
a-cdn.claude.ai, which matches*.claude.ai, and executes the prompt
The entire chain ran from an invisible iframe. The victim saw nothing.
What an Attacker Could Do
Once the attacker could inject arbitrary prompts, Claude would execute them with the user's full permissions. Demonstrated capabilities included:
- Stealing Gmail access tokens for persistent account compromise
- Exporting Google Drive contents by instructing Claude to read and relay file data
- Accessing full chat history with the AI assistant
- Sending emails as the victim, enabling phishing from a trusted address
- Reading page content from any tab the extension could access
This wasn't a theoretical risk. The researchers built a working proof of concept demonstrating each of these scenarios.
Disclosure Timeline and Anthropic's Response
Anthropic handled the disclosure responsibly and moved quickly:
| Date | Event |
|---|---|
| Dec 26, 2025 | Vulnerability reported to Anthropic via HackerOne |
| Dec 27, 2025 | Anthropic confirmed and triaged the report |
| Jan 15, 2026 | Extension patched (v1.0.41) with strict origin check requiring exactly https://claude.ai |
| Jan 18, 2026 | Fix verified, PoC now rejected with "Untrusted origin" error |
| Feb 3, 2026 | Arkose Labs XSS separately reported |
| Feb 19, 2026 | Arkose Labs patched the XSS, vulnerable URL returns 403 |
| Feb 24, 2026 | Full retest confirmed both issues resolved |
Credit where it's due: a 20-day turnaround from report to patch is solid, and Anthropic's fix was the right one, replacing the wildcard *.claude.ai pattern with an exact match for https://claude.ai.
Why This Matters Beyond Claude
ShadowPrompt is not just a story about one extension. It highlights a structural problem with how organizations adopt AI tools.
AI Extensions Are Privileged Software
Browser extensions operate with permissions that most users don't fully understand. Research from 2026 shows that 99% of enterprise users have at least one browser extension installed, and 53% have extensions with "high" or "critical" permission scopes, meaning access to cookies, passwords, and browsing activity.
AI extensions are even more sensitive because they can read, summarize, and act on content across tabs. When an AI assistant has access to Gmail, Google Drive, and your browsing session, a prompt injection vulnerability becomes an everything-access vulnerability.
The Supply Chain Problem
ShadowPrompt also illustrates third-party supply chain risk. The XSS vulnerability wasn't in Anthropic's own code. It was in Arkose Labs' CAPTCHA component, a dependency Anthropic integrated but didn't fully control. This mirrors the same pattern we've seen in CI/CD pipelines and package registries: your security posture is only as strong as your weakest dependency.
Shadow AI Is Growing
The term "Shadow AI" describes the growing use of AI tools that employees install without IT approval or security review. As Palo Alto Networks noted, browser-based AI tools are one of the least-governed attack surfaces in the enterprise. Employees install Claude, ChatGPT, or Copilot extensions because they're productive, but without any security evaluation of the permissions those extensions require.
What Compliance Frameworks Say
If your organization is pursuing or maintaining SOC 2 or ISO 27001 certification, ShadowPrompt is a textbook example of the risks these frameworks are designed to address.
SOC 2
- CC6.1 (Logical and Physical Access Controls): Requires organizations to restrict and manage access to information assets. Browser extensions with broad permissions represent uncontrolled access points that need to be inventoried and evaluated.
- CC3.2 (Risk Assessment): Third-party software, including browser extensions, must be assessed for risk. An extension with access to email, files, and browsing data is high-risk by definition.
- CC7.1 (System Monitoring): Organizations need the ability to detect and respond to security events. Without browser extension monitoring, a ShadowPrompt-style attack would leave no trace in your existing security tooling.
ISO 27001
- A.8.1 (User Endpoint Devices): Requires organizations to secure endpoint devices, including controlling what software is installed. Browser extensions fall squarely within this scope.
- A.5.19-5.22 (Supplier Relationships): Mandates security evaluation of suppliers and their products. Anthropic is a supplier; their Chrome extension is a product deployed on your endpoints.
- A.8.9 (Configuration Management): Requires documented and enforced configuration baselines. An unmanaged browser extension inventory violates this control.
The bottom line: if an auditor asks whether you have a policy governing browser extensions and AI tool usage, and you don't, that's a finding.
Practical Recommendations
Here's what you should do today to reduce your exposure to vulnerabilities like ShadowPrompt.
1. Audit Your Browser Extensions
Use Chrome's built-in enterprise management or a browser security tool to inventory all installed extensions across your organization. Flag any with:
- Access to
<all_urls>or broad host permissions - Permissions to read browsing history, cookies, or identity data
- The ability to modify page content or intercept network requests
Prioritize AI-related extensions for immediate review.
2. Enforce a Browser Extension Policy
Create an explicit policy that defines:
- Approved extensions (allowlist) for your organization
- Approval process for new extension requests
- Prohibited categories (e.g., extensions that access email or file storage without IT review)
- Auto-update requirements so patches like Anthropic's v1.0.41 are applied immediately
Use Chrome Enterprise policies or an MDM solution to enforce this at the browser level, not just on paper.
3. Implement an AI Tool Usage Policy
AI tools need their own governance framework. Your policy should cover:
- Which AI tools are approved for business use
- What data employees are allowed to share with AI assistants
- Whether AI extensions are permitted on corporate browsers
- How AI tool vendors are evaluated for security (vendor risk assessment)
- Incident response procedures if an AI tool is compromised
4. Apply Least Privilege to Extensions
For approved extensions, restrict permissions to the minimum required:
- Use Chrome's site access controls to limit which sites an extension can access
- Prefer "on click" over "on all sites" access
- Disable extensions in incognito mode unless specifically required
5. Monitor for Extension-Based Threats
Add browser extension activity to your security monitoring. Key signals include:
- New extensions installed outside your approved list
- Extensions requesting permission upgrades
- Unusual data flows from extensions to external endpoints
- Extensions communicating with unexpected domains
6. Include AI Tools in Vendor Risk Assessments
When evaluating AI tool vendors, ask:
- Does the vendor have a vulnerability disclosure program (e.g., HackerOne)?
- How quickly have they responded to past security incidents?
- What permissions does their browser extension require, and why?
- Does the vendor publish a SOC 2 Type II report or ISO 27001 certificate?
- How do they handle third-party dependencies (like the Arkose Labs component in this case)?
Anthropic's quick response to ShadowPrompt is a positive signal. But the vulnerability itself, specifically the wildcard origin check, was a fundamental design flaw that should have been caught during development.
The Bigger Picture
ShadowPrompt sits at the intersection of three trends that security teams need to address together:
- AI tool proliferation: Employees are adopting AI extensions faster than security teams can evaluate them
- Browser-as-attack-surface: Browsers have become the primary work interface, making extensions a prime target
- Supply chain complexity: Even well-funded vendors like Anthropic depend on third-party components that introduce risk
The path forward isn't to ban AI tools. It's to govern them with the same rigor you apply to any other third-party software, because that's exactly what they are.
If you're building or maintaining SOC 2 or ISO 27001 compliance, now is the time to add browser extension governance and AI tool policies to your control set. The auditors will catch up eventually. You should be ahead of them.
Immediate Action Items
- Check your Claude extension version: Go to
chrome://extensionsand verify you're running version 1.0.41 or higher - Inventory all AI browser extensions in your organization
- Add browser extensions to your next risk assessment cycle
- Draft or update your AI tool usage policy before your next audit
- Include browser extension governance in your SOC 2 or ISO 27001 scope
Need help building AI tool governance into your compliance program? At Bastion, we help startups and SMBs achieve SOC 2 and ISO 27001 certifications with managed services that cover exactly these kinds of emerging risks. Talk to us about getting your security posture audit-ready.
Share this article
Related Articles
Malicious Browser Extensions: The Overlooked Attack Vector Threatening SaaS Companies
With 8.8M+ browsers infected by a single threat actor, malicious browser extensions represent a serious but often ignored risk. Learn how to inventory extensions, set policies, and what SOC 2 auditors expect for endpoint security.
Axios npm Supply Chain Attack: Maintainer Account Hijacked, RAT Deployed to Millions
On March 31, 2026, attackers hijacked the primary maintainer's npm account for Axios, the most popular HTTP client in JavaScript, and published malicious versions that deployed a cross-platform remote access trojan. Here's what happened, who was affected, and what your team should do right now.
LiteLLM PyPI Supply Chain Attack: What Happened and How to Protect Your Organization
On March 24, 2026, attackers compromised the popular LiteLLM Python package on PyPI, injecting malware that harvested credentials, exfiltrated secrets, and attempted to backdoor Kubernetes clusters. Here's what happened, why it matters, and what your team should do now.
Learn More About Compliance
Explore our guides for deeper insights into compliance frameworks.
Security Update Management: Staying Protected
Security update management (also known as patch management) is about keeping software current and protected against known vulnerabilities. When a vulnerability is discovered and publicised, attackers often develop exploits quickly. Timely patching is one of the most effective ways to protect your organisation.
NIS 2 Vulnerability Management and Disclosure
NIS 2 addresses vulnerability management on two levels: as a required cybersecurity measure for individual organizations (Article 21) and as a coordinated vulnerability disclosure framework at the EU level (Articles 12-13). Together, these provisions create a comprehensive approach to identifying, managing, and sharing information about cybersecurity vulnerabilities.
What is an Information Security Management System (ISMS)?
An Information Security Management System (ISMS) is at the heart of ISO 27001 certification. Understanding what an ISMS is and how to build one is essential for successful certification. This guide explains everything you need to know.
Other platforms check the box
We secure the box
Get in touch and learn why hundreds of companies trust Bastion to manage their security and fast-track their compliance.
Get Started