Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-48144: n/a

0
Critical
VulnerabilityCVE-2024-48144cvecve-2024-48144
Published: Thu Oct 24 2024 (10/24/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

A prompt injection vulnerability in the chatbox of Fusion Chat Chat AI Assistant Ask Me Anything v1.2.4.0 allows attackers to access and exfiltrate all previous and subsequent chat data between the user and the AI assistant via a crafted message.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 08:52:58 UTC

Technical Analysis

CVE-2024-48144 is a prompt injection vulnerability affecting the chatbox component of Fusion Chat AI Assistant Ask Me Anything version 1.2.4.0. This vulnerability allows an attacker to craft malicious input messages that manipulate the AI assistant's prompt processing logic. By injecting specially crafted commands, the attacker can bypass intended input restrictions and access all chat data exchanged between the user and the AI assistant, including both prior and future conversations. The root cause is improper sanitization and validation of user input, leading to command injection classified under CWE-77. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact is severe, with complete confidentiality compromise of chat data and potential denial of service due to availability impact. Although no patches or fixes have been published yet, the critical severity score of 9.1 underscores the urgent need for mitigation. No active exploitation has been observed, but the vulnerability presents a high risk to any organization deploying this AI assistant in sensitive or production environments.

Potential Impact

The exploitation of CVE-2024-48144 can lead to full disclosure of sensitive chat data, including potentially confidential or proprietary information exchanged between users and the AI assistant. This compromises confidentiality and can result in data breaches, privacy violations, and regulatory non-compliance. The availability impact may cause denial of service if the assistant becomes unstable or overwhelmed by malicious inputs. Organizations relying on this AI assistant for customer support, internal communications, or decision-making risk operational disruption and reputational damage. The lack of authentication and user interaction requirements makes the attack vector broad and easy to exploit remotely. This vulnerability could be leveraged by threat actors to conduct espionage, data theft, or sabotage, especially in sectors handling sensitive data such as finance, healthcare, and government.

Mitigation Recommendations

Until an official patch is released, organizations should implement strict input validation and sanitization on all user-supplied data entering the AI assistant chatbox to block injection attempts. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious prompt injection patterns. Isolate the AI assistant environment to limit data exposure and monitor logs for anomalous input sequences or data exfiltration attempts. Consider disabling or restricting the chatbox feature if it is not critical to operations. Engage with the vendor for timely updates and patches. Additionally, conduct regular security assessments and penetration testing focused on prompt injection vectors. Implement network segmentation and least privilege principles to reduce the blast radius in case of compromise. Educate users about the risks of sharing sensitive information through AI chat interfaces until the vulnerability is resolved.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-08T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d0db7ef31ef0b56d7ac

Added to database: 2/25/2026, 9:43:41 PM

Last enriched: 2/26/2026, 8:52:58 AM

Last updated: 4/12/2026, 11:47:47 AM

Views: 24

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses