CVE-2024-5184

The EmailGPT service contains a prompt injection vulnerability. The service uses an API service that allows a malicious user to inject a direct prompt and take over the service logic. Attackers can exploit the issue by forcing the AI service to leak the standard hard-coded system prompts and/or execute unwanted prompts. When engaging with EmailGPT by submitting a malicious prompt that requests harmful information, the system will respond by providing the requested data. This vulnerability can be exploited by any individual with access to the service.
Configurations

Configuration 1 (hide)

cpe:2.3:a:emailgpt:emailgpt:-:*:*:*:*:*:*:*

History

18 Jun 2024, 17:06

Type Values Removed Values Added
CWE CWE-74
First Time Emailgpt
Emailgpt emailgpt
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.1
CPE cpe:2.3:a:emailgpt:emailgpt:-:*:*:*:*:*:*:*
References () https://www.synopsys.com/blogs/software-security/cyrc-advisory-prompt-injection-emailgpt.html - () https://www.synopsys.com/blogs/software-security/cyrc-advisory-prompt-injection-emailgpt.html - Third Party Advisory

05 Jun 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-05 18:15

Updated : 2024-06-18 17:06


NVD link : CVE-2024-5184

Mitre link : CVE-2024-5184


JSON object : View

Products Affected

emailgpt

  • emailgpt
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')