Researchers Uncover Critical Flaws in AI Tools, Including WebSocket Hijacking in Cline and Agent Hijacking in Claude Extension

Critical Flaws in AI Coding Agents and Browser Extensions Expose Developer Workflows

CRITICAL
May 12, 2026
6m read
VulnerabilitySupply Chain AttackCloud Security

Related Entities

Products & Tech

ClineClaude WebSocket

Other

Full Report

Executive Summary

The rapid integration of AI-powered tools into software development workflows has introduced a new and critical attack surface. Recent discoveries highlight this emerging risk, with researchers finding severe vulnerabilities in popular open-source AI coding agents and browser extensions. A critical WebSocket hijacking vulnerability (CVSS 9.7) was found in the local server of Cline, an AI coding agent, which could allow a malicious website to steal workspace data and execute arbitrary commands. In a separate finding, a flaw in Anthropic's Claude Chrome extension enabled other browser extensions to hijack the AI agent. These vulnerabilities demonstrate how AI components are becoming high-value targets for attackers seeking to compromise sensitive development environments and data.

Vulnerability Details

Cline AI Coding Agent

  • Vulnerability: WebSocket Hijacking
  • CVSS Score: 9.7 (Critical)
  • Description: The local Kanban server component of the Cline agent was vulnerable to WebSocket hijacking. This meant that any website opened in the developer's browser could establish a connection to the local Cline server.
  • Impact: A malicious website could exploit this to:
    • Exfiltrate Data: Read sensitive data from the developer's workspace, including source code and credentials.
    • Inject Commands: Send arbitrary commands to the AI agent, potentially forcing it to inject malicious code (e.g., a backdoor) into the project the developer was working on.
  • Remediation: The flaw was patched in version 0.1.66 of the agent.

Anthropic Claude Chrome Extension

  • Vulnerability: AI Agent Hijacking
  • Description: A flaw in the Claude browser extension allowed other, potentially malicious, browser extensions to interact with and control the Claude AI agent.
  • Impact: A malicious extension could send hidden prompts to Claude, causing it to perform unintended actions, exfiltrate the content of the user's conversations with the AI, or manipulate the AI's responses to trick the user.
  • Remediation: The issue was reported and presumably patched by Anthropic.

Threat Overview

These vulnerabilities are part of a growing trend targeting the AI software supply chain. As developers come to trust and rely on AI assistants, these tools become a powerful vector for attack.

  • Breaking the Local Security Boundary: The Cline vulnerability is particularly severe because it breaks the security boundary between the web and the local machine. A developer simply visiting a website could have their entire local development environment compromised.
  • Abusing Implicit Trust: Developers and users build a level of trust with their AI assistants. The Claude extension flaw shows how this trust can be abused, with attackers piggybacking on the legitimate extension's permissions and capabilities to carry out malicious actions silently in the background.

Technical Analysis

WebSocket Hijacking (Cline): This type of vulnerability, often a form of Cross-Site WebSocket Hijacking (CSWSH), typically occurs when a WebSocket server does not properly validate the Origin header of incoming connection requests. A malicious website (https://evil.com) can contain JavaScript that attempts to open a WebSocket connection to the local server (e.g., ws://localhost:1234). If the server doesn't check that the request is coming from a trusted origin (e.g., a specific local file or domain), it will accept the connection, giving the malicious site's script full control over the WebSocket.

Extension Hijacking (Claude): Browser extensions operate in a sandboxed but privileged environment. Communication between extensions can be a vector for attack. The flaw likely existed in how the Claude extension listened for and processed messages from other parts of the browser or other extensions, lacking proper validation of the message sender's identity.

MITRE ATT&CK Techniques

Impact Assessment

The impact of compromising a developer's AI assistant is severe. It can lead to:

  • Intellectual Property Theft: Attackers can steal proprietary source code, algorithms, and development plans.
  • Software Supply Chain Compromise: Attackers can inject subtle backdoors or vulnerabilities into a company's codebase, which will then be signed and shipped to customers as part of a legitimate product update.
  • Credential Theft: AI agents often have access to various tokens and credentials for interacting with services like GitHub, AWS, etc. These can be stolen, leading to wider infrastructure compromise.

IOCs — Directly from Articles

No specific Indicators of Compromise were provided in the source articles.

Cyber Observables — Hunting Hints

  • Network Connections: Monitor for processes on developer machines making unexpected connections to localhost or for browser processes connecting to unusual local ports.
  • Extension Auditing: Regularly audit the browser extensions installed by developers. Remove any unnecessary extensions and scrutinize the permissions requested by the remaining ones.
  • File Integrity Monitoring: Use FIM on source code repositories to detect unexpected or unauthorized changes, which could be a sign of a compromised tool injecting code.

Detection & Response

  • Detection:

    • Endpoint Monitoring: EDR tools can be configured to alert on browser processes (chrome.exe, firefox.exe) attempting to connect to local TCP ports, which could indicate a CSWSH attempt.
    • Code Review: All code, including code suggested or written by AI assistants, must still go through a rigorous human code review process before being committed.
  • Response:

    • If a vulnerable version of an AI tool is found, immediately update it and assume the developer's machine and workspace may be compromised.
    • Trigger a full rotation of the developer's credentials (SSH keys, API tokens, passwords).
    • Audit all recent code commits made by the developer for any signs of malicious injection.

Mitigation

  • Patch Management: Ensure all developer tools, including AI agents and browser extensions, are kept up-to-date with the latest security patches.
  • Principle of Least Privilege: Browser extensions should be granted the minimum permissions necessary for their function. Developers should be cautious about installing extensions that require broad permissions like "read and change all your data on all websites."
  • Network Segregation: For tools that run local servers, like Cline, configure local firewalls on the developer machine to restrict access to the server's port, only allowing connections from specific, trusted applications rather than any process.
  • Security Awareness: Train developers on the new risks associated with AI-powered tools and the importance of vetting the security of their development environment.

Timeline of Events

1
May 12, 2026
This article was published

MITRE ATT&CK Mitigations

Ensure that all AI agents, browser extensions, and other developer tools are kept up-to-date with the latest security patches.

Run local server processes with the lowest possible privileges to limit the impact of a compromise.

Use local firewalls to restrict access to local servers, preventing untrusted applications like browsers from connecting to them.

D3FEND Defensive Countermeasures

The Cline WebSocket hijacking vulnerability can be mitigated at the host level using Inbound Traffic Filtering via a local firewall. A developer's workstation firewall (like Windows Defender Firewall or ufw on Linux) should be configured with rules that restrict access to the ports used by local development servers. For the Cline Kanban server, a rule should be created to only allow connections to its port from the specific, legitimate Cline application executable. All other inbound connections, especially from browser processes like chrome.exe or firefox.exe, should be blocked. This prevents a malicious website from being able to initiate the WebSocket connection, effectively neutralizing the Cross-Site WebSocket Hijacking attack vector.

The most straightforward and essential defense against these discovered flaws is to maintain a rigorous Software Update schedule for all developer tools. For the Cline vulnerability, developers must update to version 0.1.66 or later. For the Claude extension, they must ensure the extension is set to auto-update and verify they are on the latest version. Organizations should implement policies and tools to enforce this, such as using managed browser profiles that control extension versions or running regular scans of developer environments to flag outdated and vulnerable software. This ensures that known vulnerabilities are closed before they can be exploited.

To combat the threat of malicious browser extensions like the one that could hijack the Claude agent, organizations can implement a form of Executable Allowlisting for browser extensions. Using browser management tools (e.g., Chrome Browser Cloud Management), administrators can create a policy that defines a specific list of approved extensions that users are allowed to install. All other extensions from the web store are blocked. This prevents developers from inadvertently installing a malicious extension or an extension that later becomes malicious. This reduces the attack surface and ensures that only vetted and necessary tools are running with privileged access in the browser.

Sources & References

11th May – Threat Intelligence Report
Check Point Research (checkpoint.com) May 11, 2026
Threat Intelligence: May 11, 2026
ReSecurity (resecurity.com) May 11, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

AIVulnerabilitySupply Chain AttackDeveloper ToolsClineAnthropicClaudeWebSocketBrowser Extension

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.