0-Click ChatGPT Agent Vulnerability Allows Sensitive Data Exfiltration from Gmail
The flaw, which OpenAI has since patched, leveraged a sophisticated form of indirect prompt injection hidden within an email, tricking the agent into leaking personal information directly from OpenAI’s cloud infrastructure.
According to Radware, the attack began with an attacker sending a specially crafted email to a victim. This email contained hidden instructions, invisible to the human eye, embedded within its HTML code using techniques like tiny fonts or white-on-white text.
When the user prompted the Deep Research agent to analyze their Gmail inbox, the agent would read this malicious email alongside legitimate ones.
The hidden prompts used social engineering tactics to bypass the agent’s safety protocols. These tactics included:
Once the agent processed the malicious email, it would search the user’s inbox for the specified Personally Identifiable Information (PII), such as a name and address from an HR email.
It would then encode this data and send it to the attacker-controlled server, all without any visual indicator or confirmation from the user.
What made this vulnerability particularly dangerous was its service-side nature. The data exfiltration occurred entirely within OpenAI’s cloud environment, executed by the agent’s own browsing tool.
This is a significant escalation from previous client-side attacks that relied on rendering malicious content (like images) in the user’s browser.
Because the attack originated from OpenAI’s infrastructure, it was invisible to conventional enterprise security measures like secure web gateways, endpoint monitoring, and browser security policies. The user would have no knowledge of the data leak, as nothing would be displayed on their screen, Radware said.
While the proof of concept focused on Gmail, the vulnerability’s principles could be applied to any data connector integrated with the Deep Research agent. Malicious prompts could be hidden in:
Any service that allows text-based content to be ingested by the agent could have served as a potential vector for this type of attack.
Researchers who discovered the flaw suggest that a robust mitigation strategy involves continuous monitoring of the agent’s behavior to ensure its actions align with the user’s original intent. This can help detect and block deviations caused by malicious prompts.
The vulnerability was reported to OpenAI on June 18, 2025. The issue was acknowledged, and a fix was deployed in early August. OpenAI marked the vulnerability as resolved on September 3, 2025.
Find this Story Interesting! Follow us on Google News, LinkedIn, and X to Get More Instant Updates.
The post 0-Click ChatGPT Agent Vulnerability Allows Sensitive Data Exfiltration from Gmail appeared first on Cyber Security News.
Hackers are using telecom networks and hosting providers across the Middle East as a foundation…
A large-scale phishing campaign targeting the 2026 FIFA World Cup has grown far beyond what…
Russian state-sponsored threat groups significantly stepped up their cyber operations in 2025, using a range…
A widely-used JavaScript templating library called art-template has been weaponized to deliver a sophisticated iOS…
A hacker group known as INJ3CTOR3 has been running an active campaign against FreePBX systems,…
A newly discovered banking trojan is targeting Brazilians by disguising itself as a legitimate electronic…
This website uses cookies.