Gmail Message Used to Trigger Code Execution in Claude and Bypass Protections

According to the Golan Yosef of Pynt, the attack centers on the MCP (Model Context Protocol) architecture, specifically targeting three key components: the Gmail MCP server as an untrusted content source, the Shell MCP server as the execution target, and Claude Desktop functioning as the MCP host. This research highlights the emerging threat of compositional risks in AI systems, where the integration of multiple trusted components can inadvertently create exploitable vulnerabilities that traditional security models fail to address. AI assistant systems were successfully exploited by using a crafted Gmail message to trigger code execution through Claude Desktop while bypassing built-in security protections. Attack succeeded by chaining secure components (Gmail, Claude Desktop, Shell execution) rather than exploiting individual vulnerabilities. The successful exploitation demonstrated that contextual guardrails designed to prevent cross-tool invocation attacks can be systematically undermined through session manipulation and social engineering techniques applied to the AI system itself. Standard component-based security cannot prevent threats from chained AI capabilities and cross-tool interactions. Yosef’s approach leveraged the inherent trust relationships between these components, demonstrating that no individual vulnerability was required for successful exploitation. New security frameworks must assess trust-capability combinations across AI ecosystems, not just isolated systems. This delegation model, while powerful for legitimate use cases, creates opportunities for threat actors to chain together trusted components in unexpected ways. This created a dangerous feedback loop where the AI system’s analytical capabilities were turned against its own security features.

This Cyber News was published on cybersecuritynews.com. Publication date: Wed, 16 Jul 2025 13:25:13 +0000


Cyber News related to Gmail Message Used to Trigger Code Execution in Claude and Bypass Protections

Gmail Hackers Leave Vital Clues Behind-Check These 3 Things Now - With more than 1.8 billion active accounts, Gmail is not only one of the most used services online but one of the most targeted by hackers. It's not hard to understand why, as Gmail soaks up around half of all email client usage by U.S. market share. ...
2 years ago Forbes.com
Anthropic releases Claude 3 Haiku, an AI model built for speed and affordability - Join leaders in Boston on March 27 for an exclusive night of networking, insights, and conversation. San Francisco-based startup Anthropic has just released Claude 3 Haiku, the newest addition to its Claude 3 family of AI models. Haiku stands out as ...
1 year ago Venturebeat.com
CVE-2025-52882 - Claude Code is an agentic coding tool. Claude Code extensions in VSCode and forks (e.g., Cursor, Windsurf, and VSCodium) and JetBrains IDEs (e.g., IntelliJ, Pycharm, and Android Studio) are vulnerable to unauthorized websocket connections from an ...
8 months ago
Gmail Message Used to Trigger Code Execution in Claude and Bypass Protections - According to the Golan Yosef of Pynt, the attack centers on the MCP (Model Context Protocol) architecture, specifically targeting three key components: the Gmail MCP server as an untrusted content source, the Shell MCP server as the execution target, ...
7 months ago Cybersecuritynews.com
Google rolls out easy end-to-end encryption for Gmail business users - Google says that after Gmail's new E2EE model rolls out, business users will be able to send fully encrypted emails to any user on any email service or platform without having to worry about complex certificate requirements. ​Google has started ...
11 months ago Bleepingcomputer.com
Anthropic's Claude 3.7 Sonnet is here and results are insane - “Claude Code was my ‘Feel the AGI moment.’ I’ve thrown bugs at this thing that no other models could fix, but Claude Code blasted through them," one user wrote in a Reddit thread. Additionally, Claude 3.7 Sonnet appears to ...
1 year ago Bleepingcomputer.com
Claude is testing ChatGPT-like Deep Research feature Compass - To make things easier for users, Claude is testing some system prompts for the Compass feature, such as "Find credible sources for my research" and "Provide evidence-based insights for my topic". "Compass" will allow Claude to perform certain tasks, ...
11 months ago Bleepingcomputer.com
Claude copies ChatGPT with $200 Max plan, but users aren't happy - Claude has a new subscription tier called "MAX," but it costs a whopping $200 per month, and users aren't happy with how the company enforces rate limits. In another thread, some users alleged that the existing $20 Claude Pro subscription is now ...
10 months ago Bleepingcomputer.com
Anthropic is testing GPT Codex-like Claude Code web app - Anthropic, an AI safety and research company, is currently testing a new web application called Claude Code, which functions similarly to OpenAI's GPT Codex. Claude Code is designed to assist developers by generating and understanding code, enhancing ...
6 months ago Bleepingcomputer.com
CVE-2025-55284 - Claude Code is an agentic coding tool. Prior to version 1.0.4, it's possible to bypass the Claude Code confirmation prompts to read a file and then send file contents over the network without user confirmation due to an overly broad allowlist of ...
6 months ago
CVE-2025-59828 - Claude Code is an agentic coding tool. Prior to Claude Code version 1.0.39, when using Claude Code with Yarn versions 2.0+, Yarn plugins are auto-executed when running yarn --version. This could lead to a bypass of the directory trust dialog in ...
5 months ago
Malicious PyPI packages abuse Gmail, websockets to hijack systems - Using a 'Client' class, the malware forwards traffic from the remote host to the local system through the tunnel, allowing internal admin panel and API access, file transfer, email exfiltration, shell command execution, credentials harvesting, and ...
10 months ago Bleepingcomputer.com Snatch
Do Claude Code Security Reviews Pass the Vibe Check? - The article "Do Claude Code Security Reviews Pass the Vibe Check?" explores the effectiveness and reliability of using Claude, an AI language model, for conducting code security reviews. It delves into the capabilities of Claude in identifying ...
6 months ago Darkreading.com
CVE-2025-59829 - Claude Code is an agentic coding tool. Versions below 1.0.120 failed to account for symlinks when checking permission deny rules. If a user explicitly denied Claude Code access to a file and Claude Code had access to a symlink pointing to that file, ...
5 months ago
Anthropic’s Claude AI is helping researchers analyze cyber threats - Anthropic, an AI safety and research company, has developed Claude, an AI system that is now being used to analyze cyber threats and enhance cybersecurity defenses. The AI's ability to process vast amounts of threat intelligence data quickly and ...
6 months ago Theverge.com
Addressing Deceptive AI: OpenAI Rival Anthropic Uncovers Difficulties in Correction - There is a possibility that artificial intelligence models can be trained to deceive. According to a new research led by Google-backed AI startup Anthropic, if a model exhibits deceptive behaviour, standard techniques cannot remove the deception and ...
2 years ago Cysecurity.news
Malware devs abuse Anthropic's Claude AI to build ransomware - Cybercriminals are increasingly exploiting advanced AI technologies to enhance their malicious capabilities, and the latest trend involves the abuse of Anthropic's Claude AI to develop ransomware. This alarming development highlights the evolving ...
6 months ago Bleepingcomputer.com
Gmail’s end-to-end encryption for organizations now works across email providers - Google has expanded its end-to-end encryption (E2EE) feature for Gmail, enabling organizations to secure their emails even when communicating across different email providers. This enhancement is a significant step forward in protecting sensitive ...
5 months ago Theverge.com
Gemini: Deep Research Tool for Gmail Security Analysis - Gemini is an advanced deep research tool designed to enhance Gmail security analysis. It provides cybersecurity professionals with comprehensive insights into Gmail account activities, helping to detect and mitigate potential threats. This tool ...
3 months ago Cybersecuritynews.com
Google disputes false claims of massive Gmail data breach - Google has firmly denied recent claims circulating online about a massive data breach affecting Gmail accounts. The tech giant clarified that there has been no security incident compromising Gmail user data. These false reports appear to stem from ...
4 months ago Bleepingcomputer.com
CVE-2025-66032 - Claude Code is an agentic coding tool. Prior to 1.0.93, Due to errors in parsing shell commands related to $IFS and short CLI flags, it was possible to bypass the Claude Code read-only validation and trigger arbitrary code execution. Reliably ...
3 months ago
CVE-2025-54795 - Claude Code is an agentic coding tool. In versions below 1.0.20, an error in command parsing makes it possible to bypass the Claude Code confirmation prompt to trigger execution of an untrusted command. Reliably exploiting this requires the ability ...
7 months ago
CVE-2024-58019 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago