Zero-Click Remote Code Execution in Claude Desktop Extensions
CriticalExecutive Summary
A critical zero-click remote code execution vulnerability in Claude Desktop Extensions (DXT) allows full system compromise through a weaponized Google Calendar event with no user interaction required. Published February 9, 2026 by LayerX Security researcher Roy Paz, the vulnerability exploits the absence of trust boundaries between read-only MCP connectors and high-privilege local executors.
Anthropic was notified through responsible disclosure and acknowledged the findings, but no remediation timeline has been provided as of the publication date. LayerX reports that Anthropic characterized the root cause as architectural rather than a localized bug. Organizations running Claude Desktop with DXT extensions face an immediate, unpatched threat that demands compensating controls or tool removal.
Vulnerability Details
| Field | Details |
|---|---|
| Vulnerability Type | Zero-click Remote Code Execution |
| CVSS Score | 10.0 / 10.0 (self-assessed by LayerX) |
| CVE ID | Not assigned |
| Affected Product | Claude Desktop with DXT extensions enabled |
| Attack Vector | Malicious Google Calendar event (network-accessible, zero authentication) |
| Vendor Response | Acknowledged; no remediation timeline provided |
| Estimated Exposure | 10,000+ active users; all 50 published DXT extensions |
Attack Chain: How a Calendar Invite Achieves Full System Compromise
The attack chain, demonstrated with a working proof-of-concept, requires no adversarial prompt engineering, no obfuscation, and no social engineering beyond placing a single malicious calendar event on the target’s Google Calendar.
- Weaponized Calendar Event: An attacker creates a Google Calendar event (e.g., titled “Task Management”) containing plain-text instructions in the event description directing Claude to clone a malicious repository and execute its makefile.
- Routine User Prompt: A victim with Claude Desktop Extensions installed — including both a Google Calendar connector and a local executor like Desktop Commander — issues a routine prompt such as “Please check my latest events in Google Calendar and then take care of it for me.”
- Autonomous Tool Chaining: Claude autonomously reads the calendar event via the Google Calendar MCP connector, interprets the embedded instructions as actionable tasks, and forwards them to the Desktop Commander MCP extension, which executes
git pullfrom the attacker’s repository and runs the retrieved makefile. - Full System Compromise: The attacker achieves arbitrary code execution on the victim’s machine with full user privileges — access to SSH keys, AWS credentials, browser passwords, file systems, and OS settings.
KEY PREREQUISITE: A critical prerequisite limits universal exploitability: the victim must have both a Google Calendar MCP connector and a local code-execution connector installed, and must issue a sufficiently open-ended prompt. However, this combination is common among power users, and the attack surface — publicly accessible calendar events — is trivially reachable.
Anthropic’s Response and the Architectural Impasse
According to LayerX, Anthropic was approached with the findings and acknowledged the issue, but has not committed to a remediation timeline. LayerX reports that Anthropic characterized the root cause as architectural. No official public statement from Anthropic was found on their website, documentation, status page, or GitHub repositories as of the publication date — though the same-day timing of the disclosure may account for this.
The architectural root cause is that DXT extensions run unsandboxed with full system privileges — unlike Chrome extensions, which operate inside tightly sandboxed browser environments. All installed MCP connectors are treated as flat-privileged peers: Claude autonomously determines which connectors to chain together, with no hardcoded safeguards preventing a low-risk data connector from triggering high-privilege local execution.
This contrasts with Anthropic’s response to the “PromptJacking” vulnerabilities discovered by Koi Security in July 2025 (CVSS 8.9), which were fully patched in Claude Desktop v0.1.9 by September 19, 2025. The distinction is revealing: Anthropic has remediated localized code-level bugs but appears unwilling or unable to address systemic architectural deficiencies in how MCP connectors interact.
MCP Ecosystem Vulnerability Timeline
The LayerX finding is the latest in a cascading series of MCP security failures throughout 2025–2026. An independent analysis of 100 Claude MCP servers found critical security vulnerabilities in 43%.
| Date | Incident | Severity | Researcher |
|---|---|---|---|
| Apr 2025 | WhatsApp MCP tool poisoning: chat history exfiltrated via sleeper tool | Critical | Invariant Labs |
| May 2025 | GitHub MCP prompt injection: private repo data exfiltrated via poisoned public issue | Critical | Invariant Labs |
| Jun 2025 | MCP Inspector RCE (CVE-2025-49596): unauthenticated code execution via dev tool | Critical | Security researchers |
| Jul 2025 | mcp-remote command injection (CVE-2025-6514, CVSS 9.6): 437K+ downloads affected | Critical | JFrog Security |
| Aug 2025 | Filesystem MCP Server sandbox escape (CVE-2025-53109/53110) | Critical | Cymulate |
| Sep 2025 | Malicious Postmark MCP server BCC’d all emails to attacker | Critical | IT Pro |
| Oct 2025 | Smithery MCP hosting supply-chain breach: 3,000+ apps compromised | Critical | GitGuardian |
| Nov 2025 | Koi Security PromptJacking RCE (CVSS 8.9): patched in v0.1.9 | High | Koi Security |
| Jan 2026 | PromptArmor: Claude Cowork file exfiltration via prompt injection | High | PromptArmor |
| Feb 2026 | LayerX: zero-click Calendar to Desktop Commander RCE (CVSS 10) | Critical | LayerX |
Competitive Landscape: Trust Boundaries
Every major AI platform faces the fundamental tension of mixing untrusted external content with privileged system operations. Claude Desktop Extensions have the weakest sandboxing posture among the four platforms compared.
| Platform | Sandboxing Posture | Key Defenses |
|---|---|---|
| Google (Strongest) | Multi-tier sandboxing | User Alignment Critic model, macOS Seatbelt, Docker/Podman containers |
| Microsoft (Battle-tested) | Defense-in-depth | Prompt injection classifiers, instruction hierarchy, Entra ID scoping |
| OpenAI (Granular) | Per-tool isolation | OAuth 2.1 with PKCE, manual user confirmation for writes, tiered sandbox via MDM |
| Anthropic DXT (Weakest) | No sandboxing | Extensions run unsandboxed with full system privileges; no trust boundaries |
Google (strongest): Chrome’s agentic browsing deploys a User Alignment Critic — a second, isolated Gemini model that independently vets every proposed agent action. Gemini CLI offers multi-tier sandboxing (macOS Seatbelt, Docker/Podman containers).
Microsoft (most battle-tested): Defense-in-depth combines prompt injection classifiers, instruction hierarchy training, and architectural containment via Entra ID identity scoping.
OpenAI (most granular): The Apps SDK enforces per-tool OAuth 2.1 scopes with PKCE, requiring manual user confirmation for write operations. Codex CLI provides tiered sandbox modes.
Anthropic DXT (weakest): Extensions run unsandboxed with full system privileges and no trust boundaries between connector types. Claude Code does implement OS-level sandboxing, demonstrating the capability exists but has not been applied to DXT.
SOC 2 Compliance Implications
Organizations using Claude Desktop with DXT extensions face material compliance exposure. A vendor that has acknowledged a CVSS 10.0 vulnerability without providing a remediation timeline creates an auditable condition requiring documented risk acceptance or tool removal.
CC6.1 / CC6.3 — Logical Access Controls
Absence of privilege separation between connector types violates least-privilege requirements. Auditors will examine whether AI tool permissions are documented with distinct privilege tiers.
CC7.1 / CC7.2 — System Operations
Zero-click, no-indicator attacks demand AI-specific behavioral monitoring, audit logs of all AI agent tool invocations, and anomaly detection for AI-initiated operations.
CC8.1 — Change Management
One-click DXT installation bypasses typical change management rigor. Each extension materially alters the attack surface and should require formal security review.
CC9.2 — Vendor Risk Management
Continuing to use a product with an acknowledged, unpatched CVSS 10.0 vulnerability may constitute a control deficiency. Auditors may issue an exception or qualified opinion absent robust compensating controls.
ISO 27001:2022 Compliance Implications
A.8.9 — Configuration Management
Default configuration allows unrestricted cross-connector chaining. Secure configuration baselines must enforce boundaries between connector types.
A.5.23 — Cloud Services Security
Google Calendar connector data flowing into local system execution is exactly the boundary this control requires organizations to manage.
A.8.8 — Technical Vulnerability Management
An unremediable CVSS 10.0 vulnerability must be managed through compensating controls, documented risk acceptance, or tool removal. ISO auditors could issue a nonconformity.
A.5.19 / A.5.22 — Supplier Relationships
Anthropic’s acknowledgment of the vulnerability without a remediation timeline must be documented and escalated through the supplier risk management process.
Immediate Mitigation Recommendations
Tier 1 — Immediate (Within 24–48 Hours)
- Inventory: Conduct a full inventory of all Claude Desktop installations and their installed DXT extensions across the organization.
- Identify risk combinations: Flag any systems running both an external-facing connector (Google Calendar, Gmail, cloud services) and a local executor (Desktop Commander, terminal, git, filesystem).
- Sever the chain: On flagged systems, disable either the external connector or the local executor immediately. These two categories must not coexist on the same installation until Anthropic implements trust boundaries.
- Isolate if required: If business requirements demand both capabilities, isolate Claude Desktop in a dedicated VM or container with no access to production credentials, sensitive files, or network resources.
Tier 2 — Short-Term (Within 1–2 Weeks)
- EDR rules: Deploy endpoint detection rules monitoring Claude Desktop child processes for anomalous git operations, terminal execution, filesystem writes, and outbound connections to unknown endpoints.
- Network controls: Restrict repositories and external resources accessible to Claude Desktop.
- Policy controls: Configure enterprise Group Policy or MDM to blocklist high-risk DXT extensions where not strictly required.
- Human-in-the-loop: Establish a mandatory policy requiring explicit user confirmation before any AI-initiated code execution.
Tier 3 — Medium-Term (Within 30 Days)
- Risk register: Formally document a Critical severity entry with monthly review cadence.
- Auditor memo: For SOC 2 or ISO 27001 certified organizations, prepare documentation of the vulnerability, Anthropic’s response, compensating controls, and formal risk acceptance signed by CISO.
- Evaluate alternatives: Assess Claude Code (OS-level sandboxing), Google Gemini CLI (multi-tier sandbox), or OpenAI Codex (tiered sandbox with MDM enforcement).
- Tabletop exercise: Conduct an AI-agent-mediated system compromise scenario to validate incident response readiness.
Tier 4 — Strategic
- Monitor: Track Anthropic’s engineering blog and DXT documentation for architectural security improvements.
- Engage vendor: Request a formal remediation timeline through enterprise support channels.
- Industry participation: Contribute to OWASP’s Agentic Applications working group and incorporate AI agent tool-use security into vendor assessment frameworks.
Conclusion
This vulnerability crystallizes a systemic challenge facing the entire AI agent ecosystem: the trust boundary problem is architectural, not incidental. When an AI model autonomously decides which tools to chain together, and those tools span the spectrum from reading public calendar data to executing arbitrary system commands, every connected data source becomes an attack surface for full system compromise.
The critical insight is not that Claude Desktop has a bug — it is that the MCP connector architecture was designed for capability without corresponding security isolation. Anthropic’s willingness to patch localized code-level flaws while not yet addressing the systemic trust-boundary issue suggests an unresolved tension between usability and security in the agent-tool paradigm.
KEY TAKEAWAY: For organizations today, the calculus is straightforward: external-facing MCP connectors and high-privilege local executors must not coexist on the same Claude Desktop installation until Anthropic implements privilege separation, sandboxing, or mandatory confirmation gates for cross-connector tool chaining. The compliance implications are equally clear — a CVSS 10.0 vulnerability with unavailable remediation demands either compensating controls robust enough to satisfy auditors or removal of the tool from production environments.
References
- LayerX Security: Claude Desktop Extensions RCE — layerxsecurity.com/blog/claude-desktop-extensions-rce/
- Infosecurity Magazine: Claude Desktop Extensions Vulnerable to Web-Based Prompt Injection
- Koi Security: PromptJacking Critical RCEs in Claude Desktop
- JFrog Security: CVE-2025-6514 Critical MCP Remote RCE Vulnerability
- AuthZed: A Timeline of Model Context Protocol Security Breaches
- OWASP Top 10 for Agentic Applications (December 2025)
- Anthropic: Responsible Disclosure Policy — anthropic.com/responsible-disclosure-policy
- Anthropic Engineering: Claude Code Sandboxing
- Noma Security: GeminiJack Zero-Click Vulnerability
- Microsoft Learn: Security for Microsoft 365 Copilot
- OpenAI: Apps SDK Security & Privacy; Codex Security
- Greshake et al. (AISec@CCS 2023): Indirect Prompt Injection in LLM-Integrated Applications
- InjecAgent (ACL 2024): Benchmarking Indirect Prompt Injections in Tool-Integrated LLM Agents