The rapid integration of AI-powered tools into software development workflows has introduced a new and critical attack surface. Recent discoveries highlight this emerging risk, with researchers finding severe vulnerabilities in popular open-source AI coding agents and browser extensions. A critical WebSocket hijacking vulnerability (CVSS 9.7) was found in the local server of Cline, an AI coding agent, which could allow a malicious website to steal workspace data and execute arbitrary commands. In a separate finding, a flaw in Anthropic's Claude Chrome extension enabled other browser extensions to hijack the AI agent. These vulnerabilities demonstrate how AI components are becoming high-value targets for attackers seeking to compromise sensitive development environments and data.
These vulnerabilities are part of a growing trend targeting the AI software supply chain. As developers come to trust and rely on AI assistants, these tools become a powerful vector for attack.
WebSocket Hijacking (Cline): This type of vulnerability, often a form of Cross-Site WebSocket Hijacking (CSWSH), typically occurs when a WebSocket server does not properly validate the Origin header of incoming connection requests. A malicious website (https://evil.com) can contain JavaScript that attempts to open a WebSocket connection to the local server (e.g., ws://localhost:1234). If the server doesn't check that the request is coming from a trusted origin (e.g., a specific local file or domain), it will accept the connection, giving the malicious site's script full control over the WebSocket.
Extension Hijacking (Claude): Browser extensions operate in a sandboxed but privileged environment. Communication between extensions can be a vector for attack. The flaw likely existed in how the Claude extension listened for and processed messages from other parts of the browser or other extensions, lacking proper validation of the message sender's identity.
T1190 - Exploit Public-Facing Application: The Cline local server acts as a public-facing application on the localhost, which was exploited.T1173 - Cross-Site Scripting: The principle is similar to XSS, where a malicious site executes code in a different security context (the local server).T1136.002 - Create Account: Create Cloud Account: A malicious extension could hijack Claude to perform actions on behalf of the user.T1565.001 - Data Manipulation: Stored Data Manipulation: The ability to inject commands into the Cline agent to alter source code is a form of stored data manipulation.The impact of compromising a developer's AI assistant is severe. It can lead to:
No specific Indicators of Compromise were provided in the source articles.
localhost or for browser processes connecting to unusual local ports.Detection:
chrome.exe, firefox.exe) attempting to connect to local TCP ports, which could indicate a CSWSH attempt.Response:
Ensure that all AI agents, browser extensions, and other developer tools are kept up-to-date with the latest security patches.
Run local server processes with the lowest possible privileges to limit the impact of a compromise.
Use local firewalls to restrict access to local servers, preventing untrusted applications like browsers from connecting to them.
The Cline WebSocket hijacking vulnerability can be mitigated at the host level using Inbound Traffic Filtering via a local firewall. A developer's workstation firewall (like Windows Defender Firewall or ufw on Linux) should be configured with rules that restrict access to the ports used by local development servers. For the Cline Kanban server, a rule should be created to only allow connections to its port from the specific, legitimate Cline application executable. All other inbound connections, especially from browser processes like chrome.exe or firefox.exe, should be blocked. This prevents a malicious website from being able to initiate the WebSocket connection, effectively neutralizing the Cross-Site WebSocket Hijacking attack vector.
The most straightforward and essential defense against these discovered flaws is to maintain a rigorous Software Update schedule for all developer tools. For the Cline vulnerability, developers must update to version 0.1.66 or later. For the Claude extension, they must ensure the extension is set to auto-update and verify they are on the latest version. Organizations should implement policies and tools to enforce this, such as using managed browser profiles that control extension versions or running regular scans of developer environments to flag outdated and vulnerable software. This ensures that known vulnerabilities are closed before they can be exploited.
To combat the threat of malicious browser extensions like the one that could hijack the Claude agent, organizations can implement a form of Executable Allowlisting for browser extensions. Using browser management tools (e.g., Chrome Browser Cloud Management), administrators can create a policy that defines a specific list of approved extensions that users are allowed to install. All other extensions from the web store are blocked. This prevents developers from inadvertently installing a malicious extension or an extension that later becomes malicious. This reduces the attack surface and ensures that only vetted and necessary tools are running with privileged access in the browser.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.