CWE-1427 Detail

CWE-1427

Improper Neutralization of Input Used for LLM Prompting
Incomplete
2024-11-19
00h00 +00:00
2025-12-11
00h00 +00:00
Notifiche per un CWE specifico
Rimani informato su qualsiasi modifica relativa a un CWE specifico.
Gestione notifiche

Nome: Improper Neutralization of Input Used for LLM Prompting

The product uses externally-provided data to build prompts provided to large language models (LLMs), but the way these prompts are constructed causes the LLM to fail to distinguish between user-supplied inputs and developer provided system directives.

General Informations

Modes Of Introduction

Architecture and Design
Implementation
Implementation
System Configuration
Integration
Bundling

Piattaforme applicabili

Linguaggio

Class: Not Language-Specific (Undetermined)

Sistemi operativi

Class: Not OS-Specific (Undetermined)

Architetture

Class: Not Architecture-Specific (Undetermined)

Tecnologie

Name: AI/ML (Undetermined)

Conseguenze comuni

Ambito Impatto Probabilità
Confidentiality
Integrity
Availability
Execute Unauthorized Code or Commands, Varies by Context
ConfidentialityRead Application Data
IntegrityModify Application Data, Execute Unauthorized Code or Commands
Access ControlRead Application Data, Modify Application Data, Gain Privileges or Assume Identity

Esempi osservati

Riferimenti Descrizione

CVE-2023-32786

Chain: LLM integration framework has prompt injection (CWE-1427) that allows an attacker to force the service to retrieve data from an arbitrary URL, essentially providing SSRF (CWE-918) and potentially injecting content into downstream tasks.

CVE-2024-5184

ML-based email analysis product uses an API service that allows a malicious user to inject a direct prompt and take over the service logic, forcing it to leak the standard hard-coded system prompts and/or execute unwanted prompts to leak sensitive data.

CVE-2024-5565

Chain: library for generating SQL via LLMs using RAG uses a prompt function to present the user with visualized results, allowing altering of the prompt using prompt injection (CWE-1427) to run arbitrary Python code (CWE-94) instead of the intended visualization code.

CVE-2024-48746

AI-based integration with business intel dashboard allows prompt injection through its natural language component, allowing execution of arbitrary code

Potential Mitigations

Phases : Architecture and Design
Phases : Implementation
Phases : Architecture and Design
Phases : Implementation
Phases : Installation // Operation
Phases : System Configuration

Detection Methods

Dynamic Analysis with Manual Results Interpretation

Dynamic Analysis with Automated Results Interpretation

Architecture or Design Review

Note sulla mappatura delle vulnerabilità

Giustificazione : This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
Commento : Ensure that the weakness being identified involves improper neutralization during prompt generation. A different CWE might be needed if the core concern is related to inadvertent insertion of sensitive information, generating prompts from third-party sources that should not have been trusted (as may occur with indirect prompt injection), or jailbreaking, then the root cause might be a different weakness.

Riferimenti

REF-1450

OWASP Top 10 for Large Language Model Applications - LLM01
OWASP.
https://genai.owasp.org/llmrisk/llm01-prompt-injection/

REF-1451

IBM - What is a prompt injection attack?
Matthew Kosinski, Amber Forrest.
https://www.ibm.com/think/topics/prompt-injection

REF-1452

Not what you've signed up for: Compromising Real-World LLM-Integrated Applications with Indirect Prompt Injection
Kai Greshake, Sahar Abdelnabi, Shailesh Mishra, Christoph Endres, Thorsten Holz, Mario Fritz.
https://arxiv.org/abs/2302.12173

Invio

Nome Organizzazione Data Data di rilascio Version
Max Rattray Praetorian 2024-06-21 +00:00 2024-11-19 +00:00 4.16

Modifiche

Nome Organizzazione Data Commento
CWE Content Team MITRE 2025-09-09 +00:00 updated References
CWE Content Team MITRE 2025-12-11 +00:00 updated Observed_Examples, Weakness_Ordinalities