Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-45989: n/a

0
Medium
VulnerabilityCVE-2024-45989cvecve-2024-45989
Published: Thu Sep 26 2024 (09/26/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Monica AI Assistant desktop application v2.3.0 is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor. A prompt injection allows an attacker to modify chatbot answer with an unloaded image that exfiltrates the user's sensitive chat data of the current session to a malicious third-party or attacker-controlled server.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 07:12:30 UTC

Technical Analysis

CVE-2024-45989 is a vulnerability in Monica AI Assistant desktop application version 2.3.0 that enables exposure of sensitive information through prompt injection attacks. The flaw allows an attacker to manipulate the chatbot's response by injecting a specially crafted prompt that includes an unloaded image tag. When the chatbot processes this prompt, it generates a response containing the image reference, which triggers a request to a malicious third-party server controlled by the attacker. This request exfiltrates sensitive chat data from the current user session without requiring any authentication or user interaction. The vulnerability is classified under CWE-77, indicating improper neutralization of special elements used in commands or queries, which in this case is the injection of malicious content into chatbot responses. The attack vector is local (AV:L), meaning the attacker must have local access to the victim's machine or environment where the Monica AI Assistant is running. The vulnerability does not affect the integrity or availability of the system but compromises confidentiality by leaking sensitive chat data. No patches or fixes have been published at the time of disclosure, and there are no known exploits actively used in the wild. The CVSS v3.1 base score is 4.0, reflecting a medium severity level due to the limited attack vector and impact scope.

Potential Impact

The primary impact of CVE-2024-45989 is the unauthorized disclosure of sensitive information contained within the Monica AI Assistant chat sessions. Organizations using this application risk leakage of confidential communications, potentially exposing personal data, business secrets, or other sensitive content. Since the vulnerability requires local access, the threat is mainly from insider attackers or malware that has already compromised the endpoint. The lack of integrity or availability impact means the system's operation remains unaffected, but confidentiality breaches can lead to reputational damage, regulatory penalties, and loss of trust. This vulnerability could be exploited in environments where Monica AI Assistant is used for sensitive conversations, such as corporate, legal, or healthcare settings. The absence of known exploits reduces immediate risk, but the availability of technical details means attackers could develop exploits if local access is gained.

Mitigation Recommendations

To mitigate CVE-2024-45989, organizations should implement the following specific measures: 1) Restrict local access to systems running Monica AI Assistant to trusted users only, employing strict access controls and endpoint security solutions to prevent unauthorized local access. 2) Monitor and audit local user activities for suspicious behavior indicative of prompt injection attempts or unauthorized chatbot manipulation. 3) Disable or restrict the use of external content loading within chatbot responses if configurable, to prevent exfiltration via unloaded images or similar techniques. 4) Employ network monitoring to detect unusual outbound requests from the Monica AI Assistant process, especially to unknown or suspicious external servers. 5) Until a patch is available, consider isolating the application environment or using virtual machines to limit data exposure. 6) Educate users about the risks of local threats and the importance of securing their endpoints. 7) Engage with the vendor for updates and patches and apply them promptly once released.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-09-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cf6b7ef31ef0b56a86b

Added to database: 2/25/2026, 9:43:18 PM

Last enriched: 2/28/2026, 7:12:30 AM

Last updated: 4/12/2026, 5:08:14 PM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses