U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2024-5184

Change History

New CVE Received by NIST 6/05/2024 2:15:11 PM

Action Type Old Value New Value
Added CVSS V3.1

								
							
							
						
Synopsys AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Added CVSS V4.0

								
							
							
						
Synopsys CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Added CWE

								
							
							
						
Synopsys CWE-74
Added Description

								
							
							
						
The EmailGPT service contains a prompt injection vulnerability. The service uses an API service that allows a malicious user to inject a direct prompt and take over the service logic. Attackers can exploit the issue by forcing the AI service to leak the standard hard-coded system prompts and/or execute unwanted prompts. When engaging with EmailGPT by submitting a malicious prompt that requests harmful information, the system will respond by providing the requested data. This vulnerability can be exploited by any individual with access to the service.
Added Reference

								
							
							
						
Synopsys https://www.synopsys.com/blogs/software-security/cyrc-advisory-prompt-injection-emailgpt.html [No types assigned]