Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
OpenAI Atlas Browser Vulnerability Allows Malicious Code Injection into ChatGPT

OpenAI Atlas Browser Vulnerability Allows Malicious Code Injection into ChatGPT

Posted on October 27, 2025October 27, 2025 By CWS

A crucial vulnerability in OpenAI’s newly launched ChatGPT Atlas browser permits attackers to inject malicious directions into ChatGPT’s reminiscence and execute distant code on consumer methods.

This flaw, uncovered by LayerX, exploits Cross-Website Request Forgery (CSRF) to hijack authenticated classes, probably infecting gadgets with malware or granting unauthorized entry. The invention highlights escalating dangers in agentic AI browsers, the place built-in LLMs amplify conventional internet threats.​

Reported to OpenAI below accountable disclosure protocols, the vulnerability impacts ChatGPT customers throughout browsers however poses heightened risks for Atlas adopters as a consequence of its always-on authentication and weak phishing defenses.

LayerX’s checks revealed that Atlas blocks solely 5.8% of phishing makes an attempt, in comparison with 47-53% for Chrome and Edge, making its customers as much as 90% extra uncovered. Whereas OpenAI has not publicly detailed patches, consultants urge speedy mitigations like enhanced token validation.​

How the CSRF Exploit Targets ChatGPT Reminiscence

The assault begins with a consumer logged into ChatGPT, storing authentication cookies or tokens of their browser. Attackers lure victims to a malicious webpage by way of phishing hyperlinks, which then set off a CSRF request leveraging the prevailing session.

This cast request injects hidden directions into ChatGPT’s “Reminiscence” characteristic, designed to retain consumer preferences and context throughout classes with out specific repetition.​

Not like commonplace CSRF impacts like unauthorized transactions, this variant targets AI methods by tainting the LLM’s persistent “unconscious.”

As soon as embedded, malicious directives activate throughout legit queries, compelling ChatGPT to generate dangerous outputs corresponding to distant code fetches from attacker-controlled servers. The an infection persists throughout gadgets and browsers tied to the account, complicating detection and remediation.​

The connected diagram illustrates the assault move: from credential hijacking to reminiscence injection and distant execution.

Atlas’s default login to ChatGPT retains credentials available, streamlining CSRF exploitation with out extra token phishing.

LayerX evaluated Atlas in opposition to 103 real-world assaults, discovering it permitted 94.2% to succeed, far worse than opponents like Perplexity’s Comet, which failed 93% in prior checks. This stems from the absence of built-in protections, turning the browser into a primary vector for AI-specific threats like immediate injection.​

Broader analysis echoes these issues; Courageous’s evaluation of AI browsers, together with Atlas, uncovered oblique immediate injections that embed instructions in webpages or screenshots, resulting in knowledge exfiltration or unauthorized actions.

OpenAI’s agentic options, permitting autonomous duties, exacerbate dangers by granting the AI decision-making energy over consumer knowledge and methods.​

Proof-of-Idea: Malicious ‘Vibe Coding’

In a demonstrated situation, attackers goal “vibe coding,” the place builders collaborate with AI on high-level undertaking intents slightly than inflexible syntax.

Injected reminiscence directions subtly alter outputs, embedding backdoors or exfiltration code in generated scripts, corresponding to pulling malware from a server like “server.rapture.”​

ChatGPT might problem refined warnings, however subtle masking typically evades them, permitting seamless supply of tainted code. Customers downloading these scripts danger system compromise, underscoring how AI flexibility invitations abuse.

This PoC aligns with rising exploits in instruments like Gemini, the place related injections entry shared company knowledge.​

As AI browsers proliferate, vulnerabilities like this demand sturdy safeguards past fundamental browser tech. Enterprises ought to prioritize third-party extensions for visibility, whereas customers allow multi-factor authentication and monitor classes.

LayerX’s findings reinforce that with out swift updates, Atlas may redefine AI safety pitfalls.​

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Atlas, Browser, ChatGPT, Code, Injection, Malicious, OpenAI, Vulnerability

Post navigation

Previous Post: New ChatGPT Atlas Browser Exploit Lets Attackers Plant Persistent Hidden Commands
Next Post: 1inch partners with Innerworks to strengthen DeFi security through AI-Powered threat detection

Related Posts

Agenda Ransomware Actors Deploying Linux RAT on Windows Systems Targeting VMware Deployments Agenda Ransomware Actors Deploying Linux RAT on Windows Systems Targeting VMware Deployments Cyber Security News
CISA Warns of Trend Micro Apex One OS Command Injection Vulnerability Exploited in Attacks CISA Warns of Trend Micro Apex One OS Command Injection Vulnerability Exploited in Attacks Cyber Security News
PoC Exploit Unveiled for Lenovo Code Execution Vulnerability Enabling Privilege Escalation PoC Exploit Unveiled for Lenovo Code Execution Vulnerability Enabling Privilege Escalation Cyber Security News
Attackers Exploiting React2Shell Vulnerability to Attack IT Sectors Attackers Exploiting React2Shell Vulnerability to Attack IT Sectors Cyber Security News
Critical Vulnerability in SmarterMail Let Attackers Execute Remote Code Critical Vulnerability in SmarterMail Let Attackers Execute Remote Code Cyber Security News
Microsoft Investigates Defender Portal Access Issues Following Traffic Spike Microsoft Investigates Defender Portal Access Issues Following Traffic Spike Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News