The EmailGPT service contains a prompt injection vulnerability. The service uses an API service that allows a malicious user to inject a direct prompt and take over the service logic. Attackers can exploit the issue by forcing the AI service to leak the standard hard-coded system prompts and/or execute unwanted prompts. When engaging with EmailGPT by submitting a malicious prompt that requests harmful information, the system will respond by providing the requested data. This vulnerability can be exploited by any individual with access to the service.
References
Link | Resource |
---|---|
https://www.synopsys.com/blogs/software-security/cyrc-advisory-prompt-injection-emailgpt.html | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-06-05 18:15
Updated : 2024-06-18 17:06
NVD link : CVE-2024-5184
Mitre link : CVE-2024-5184
CVE.ORG link : CVE-2024-5184
JSON object : View
Products Affected
emailgpt
- emailgpt
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')