Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-48141: n/a

0
High
VulnerabilityCVE-2024-48141cvecve-2024-48141
Published: Thu Oct 24 2024 (10/24/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

A prompt injection vulnerability in the chatbox of Zhipu AI CodeGeeX v2.17.0 allows attackers to access and exfiltrate all previous and subsequent chat data between the user and the AI assistant via a crafted message.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 07:39:09 UTC

Technical Analysis

CVE-2024-48141 identifies a prompt injection vulnerability in the chatbox component of Zhipu AI CodeGeeX version 2.17.0. This vulnerability allows an attacker to send specially crafted messages that manipulate the AI assistant's prompt processing logic, enabling unauthorized access to all prior and future chat interactions between the user and the AI. The root cause aligns with CWE-77, which involves improper neutralization of special elements used in commands or queries, leading to injection attacks. The vulnerability has a CVSS v3.1 base score of 7.5, reflecting high severity due to its network attack vector, low attack complexity, no required privileges or user interaction, and a significant confidentiality impact. Exploitation does not affect data integrity or system availability but compromises sensitive conversational data confidentiality. No patches or fixes have been published as of the vulnerability disclosure date (October 24, 2024), and no active exploitation has been reported. The vulnerability poses a significant risk to users of Zhipu AI CodeGeeX, especially in environments where sensitive or proprietary information is exchanged via the AI chat interface. Attackers could leverage this flaw to exfiltrate confidential data, potentially leading to privacy violations, intellectual property theft, or exposure of strategic communications.

Potential Impact

The primary impact of CVE-2024-48141 is the unauthorized disclosure of sensitive chat data exchanged between users and the AI assistant. This breach of confidentiality can lead to significant privacy violations, leakage of proprietary or personal information, and potential compliance issues for organizations handling regulated data. Since the vulnerability does not affect integrity or availability, the AI system's operational functionality remains intact; however, the loss of confidentiality alone can have severe reputational and financial consequences. Organizations relying on Zhipu AI CodeGeeX for internal communications, customer support, or development assistance are at risk of data exfiltration by remote attackers without any authentication or user interaction. The ease of exploitation and network accessibility increase the threat level, making it a critical concern for enterprises integrating this AI assistant into their workflows. Additionally, the absence of patches or mitigations at disclosure time heightens exposure until fixes are implemented.

Mitigation Recommendations

To mitigate CVE-2024-48141, organizations should immediately restrict access to the vulnerable Zhipu AI CodeGeeX v2.17.0 chatbox, especially in sensitive environments. Implement strict input validation and sanitization on all user-supplied messages to prevent injection of malicious prompt commands. Employ monitoring and anomaly detection to identify unusual chat patterns or data exfiltration attempts. Where possible, isolate the AI assistant within segmented network zones to limit exposure. Engage with Zhipu AI vendors for timely updates and patches addressing this vulnerability. Until official patches are available, consider disabling or limiting chat history features to reduce the volume of data at risk. Educate users about the risks of sharing sensitive information via AI chat interfaces. Finally, conduct regular security assessments and penetration testing focused on AI prompt injection vectors to proactively identify and remediate similar issues.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-08T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d0bb7ef31ef0b56d742

Added to database: 2/25/2026, 9:43:39 PM

Last enriched: 2/28/2026, 7:39:09 AM

Last updated: 4/12/2026, 6:18:45 PM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses