CWE-1427 Detail

CWE-1427

Improper Neutralization of Input Used for LLM Prompting
Incomplete
2024-11-19
00h00 +00:00
2025-12-11
00h00 +00:00
Notifications for a CWE
Stay informed of any changes for a specific CWE.
Notifications manage

Name: Improper Neutralization of Input Used for LLM Prompting

The product uses externally-provided data to build prompts provided to large language models (LLMs), but the way these prompts are constructed causes the LLM to fail to distinguish between user-supplied inputs and developer provided system directives.

General Informations

Modes Of Introduction

Architecture and Design
Implementation
Implementation
System Configuration
Integration
Bundling

Applicable Platforms

Language

Class: Not Language-Specific (Undetermined)

Operating Systems

Class: Not OS-Specific (Undetermined)

Architectures

Class: Not Architecture-Specific (Undetermined)

Technologies

Name: AI/ML (Undetermined)

Common Consequences

Scope Impact Likelihood
Confidentiality
Integrity
Availability
Execute Unauthorized Code or Commands, Varies by Context
ConfidentialityRead Application Data
IntegrityModify Application Data, Execute Unauthorized Code or Commands
Access ControlRead Application Data, Modify Application Data, Gain Privileges or Assume Identity

Observed Examples

References Description

CVE-2023-32786

Chain: LLM integration framework has prompt injection (CWE-1427) that allows an attacker to force the service to retrieve data from an arbitrary URL, essentially providing SSRF (CWE-918) and potentially injecting content into downstream tasks.

CVE-2024-5184

ML-based email analysis product uses an API service that allows a malicious user to inject a direct prompt and take over the service logic, forcing it to leak the standard hard-coded system prompts and/or execute unwanted prompts to leak sensitive data.

CVE-2024-5565

Chain: library for generating SQL via LLMs using RAG uses a prompt function to present the user with visualized results, allowing altering of the prompt using prompt injection (CWE-1427) to run arbitrary Python code (CWE-94) instead of the intended visualization code.

CVE-2024-48746

AI-based integration with business intel dashboard allows prompt injection through its natural language component, allowing execution of arbitrary code

Potential Mitigations

Phases : Architecture and Design
Phases : Implementation
Phases : Architecture and Design
Phases : Implementation
Phases : Installation // Operation
Phases : System Configuration

Detection Methods

Dynamic Analysis with Manual Results Interpretation

Dynamic Analysis with Automated Results Interpretation

Architecture or Design Review

Vulnerability Mapping Notes

Justification : This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
Comment : Ensure that the weakness being identified involves improper neutralization during prompt generation. A different CWE might be needed if the core concern is related to inadvertent insertion of sensitive information, generating prompts from third-party sources that should not have been trusted (as may occur with indirect prompt injection), or jailbreaking, then the root cause might be a different weakness.

References

REF-1450

OWASP Top 10 for Large Language Model Applications - LLM01
OWASP.
https://genai.owasp.org/llmrisk/llm01-prompt-injection/

REF-1451

IBM - What is a prompt injection attack?
Matthew Kosinski, Amber Forrest.
https://www.ibm.com/think/topics/prompt-injection

REF-1452

Not what you've signed up for: Compromising Real-World LLM-Integrated Applications with Indirect Prompt Injection
Kai Greshake, Sahar Abdelnabi, Shailesh Mishra, Christoph Endres, Thorsten Holz, Mario Fritz.
https://arxiv.org/abs/2302.12173

Submission

Name Organization Date Date release Version
Max Rattray Praetorian 2024-06-21 +00:00 2024-11-19 +00:00 4.16

Modifications

Name Organization Date Comment
CWE Content Team MITRE 2025-09-09 +00:00 updated References
CWE Content Team MITRE 2025-12-11 +00:00 updated Observed_Examples, Weakness_Ordinalities