Particle.news

Download on the App Store

OpenAI Patches 'ShadowLeak' Flaw That Let ChatGPT's Deep Research Exfiltrate Gmail Data

The zero‑click server‑side prompt injection ran from OpenAI’s cloud, leaving typical client and gateway defenses blind.

Overview

  • Radware reported the issue on June 18 via Bugcrowd, OpenAI implemented a fix in early August, and acknowledged it as resolved on September 3 before public disclosure this week.
  • A crafted email hid instructions in HTML that, when processed by Deep Research, coerced the agent to harvest inbox PII and call an attacker URL using the browser.open tool.
  • Researchers boosted reliability by Base64‑encoding the extracted data before appending it to the URL, which helped bypass guardrails that flagged direct exfiltration.
  • Requests originated from OpenAI’s infrastructure rather than the user’s device, leaving minimal local traces and evading many enterprise monitoring controls.
  • The proof of concept targeted Gmail but the technique could apply to other connectors such as Google Drive, Dropbox, Outlook, GitHub, HubSpot, Notion, and SharePoint; Radware says the specific PoC no longer works and there is no public evidence of real‑world abuse.