Categories: Cyber Security News

ChatGPT Vulnerability Allows Silent Exfiltration of User Prompts and Sensitive Data

A critical vulnerability discovered in ChatGPT’s code execution environment allowed threat actors to silently exfiltrate user prompts, uploaded files, and other sensitive data through a hidden outbound channel all without triggering any visible security warnings to the user.

How the Vulnerability Worked

Researchers at Check Point Research uncovered the flaw in ChatGPT’s Python-based Data Analysis Linux runtime environment.

While OpenAI heavily restricts standard outbound internet traffic, including HTTP and TCP requests, the containerized runtime still permits Domain Name System (DNS) resolution to function normally.

Attackers exploited this gap through a technique called DNS tunneling, where sensitive data fragments are encoded and appended as subdomains to attacker-controlled domains.

Because DNS queries are treated as routine infrastructure traffic rather than data transfers, the system never triggered outbound data warnings for users.

Threat actors could exploit this vulnerability through two distinct vectors. In the first method, a malicious prompt was distributed online, disguised as a “jailbreak” or a productivity trick, and once pasted into a chat session, it immediately weaponized the conversation.

In the second method, attackers embedded malicious logic directly into a backdoored Custom GPT.

Any user who shared data with that custom assistant would be instantly compromised, without requiring any additional prompt injection.

The severity extended well beyond passive data exfiltration. Because the DNS channel was bidirectional, attackers could encode command fragments within DNS responses sent back to the container.

This effectively established a remote shell inside ChatGPT’s Linux container, enabling threat actors to execute arbitrary commands entirely outside the model’s standard safety mechanisms including accessing any medical records, financial data, or files processed during the session.

Detail Information
Target Platform ChatGPT Code Execution & Data Analysis Linux Runtime
Attack Vector Malicious prompts or backdoored Custom GPTs
Exploit Technique DNS Tunneling via encoded subdomain labels
Impact Silent data exfiltration and remote shell access
Patch Date February 20, 2026

OpenAI successfully patched the vulnerability on February 20, 2026, following responsible disclosure by Check Point Research.

This incident signals a critical shift in AI security: as large language models evolve into full code execution environments capable of processing sensitive personal, medical, and financial data, securing all communication layers, including foundational infrastructure protocols like DNS, becomes non-negotiable.

Platform providers must ensure that no infrastructure-level channel can be weaponized to bypass application-layer data protections.

Follow us on Google News , LinkedIn and X to Get More Instant UpdatesSet Cyberpress as a Preferred Source in Google

The post ChatGPT Vulnerability Allows Silent Exfiltration of User Prompts and Sensitive Data appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Hackers Abuse Middle East Telecom Networks for Large-Scale Command-and-Control Operations

Hackers are using telecom networks and hosting providers across the Middle East as a foundation…

54 minutes ago

World Cup Phishing Campaign Nearly Triples With 203 Unique IP Addresses

A large-scale phishing campaign targeting the 2026 FIFA World Cup has grown far beyond what…

54 minutes ago

Russian Threat Groups Use RDP, VPN, Supply Chain Attacks, and Social Engineering for Initial Access

Russian state-sponsored threat groups significantly stepped up their cyber operations in 2025, using a range…

4 hours ago

Hackers Backdoor Popular art-template npm Package to Launch Watering-Hole Attacks

A widely-used JavaScript templating library called art-template has been weaponized to deliver a sophisticated iOS…

4 hours ago

Hackers Use Six-Layer Persistence to Maintain Access on Compromised FreePBX Systems

A hacker group known as INJ3CTOR3 has been running an active campaign against FreePBX systems,…

4 hours ago

Hackers Use NF-e Invoice Lures to Deliver Banana RAT Through Malicious Batch Files

A newly discovered banking trojan is targeting Brazilians by disguising itself as a legitimate electronic…

4 hours ago

This website uses cookies.