OpenAI ShadowLeak Vulnerability Patched

In September 2025, a security research firm named Radware revealed a critical zero-click vulnerability in OpenAI’s ChatGPT Deep Research agent. This flaw, dubbed ShadowLeak, exposed a new kind of threat: a service-side data leak that could exfiltrate private information directly from OpenAI’s cloud infrastructure—with no user interaction required. OpenAI responded by patching the vulnerability in early August, but the discovery has lasting implications for how we think about AI agent security.
OpenAI ShadowLeak Vulnerability Patched

This post walks through:

  1. What exactly ShadowLeak was
  2. How the exploit worked
  3. The timeline of disclosure and the patch
  4. Risks and impact
  5. Mitigation strategies and lessons learned

What Was ShadowLeak?

ShadowLeak represents a novel class of vulnerability: a zero-click, service-side prompt injection targetting autonomous AI agents.

To unpack that:

  • Zero-click means the user never needs to open, click, or even view a malicious email or link for the exploit to run.
  • Service-side means the data leakage happens entirely within OpenAI’s backend (on their servers), rather than being passed through the user’s device or network where it might be detected.
  • Indirect prompt injection refers to hidden commands embedded in benign content (e.g. in email HTML) which the AI agent unknowingly follows.

Put simply: an attacker could send a specially crafted email that contains hidden instructions (invisible to humans) that convince the Deep Research agent to leak private data to the attacker’s server—all without the user ever seeing or doing anything suspicious.

How the ShadowLeak Exploit Worked (Technical Flow)

Here’s a simplified breakdown of the attack chain:

1. Crafted Email Delivery

The attacker sends an email to a target’s Gmail (or other integrated inbox). The email looks harmless—regular subject line, normal formatting. Hidden within its HTML (e.g. white text on white background, minuscule font size, CSS obfuscation) are invisible directives aimed at the AI agent.

2. User Requests Deep Research on Inbox

At some point, the user may ask ChatGPT (via Deep Research) to “summarize today’s emails,” “look up certain threads in my inbox,” or ask any task that causes the agent to read and ingest the content of the mailbox.

3. Agent Ingests Hidden Prompts

Because the malicious prompts are embedded in the email HTML, the Deep Research agent parses and “understands” them, even though they are invisible to human eyes. The agent treats them as instructions to carry out.

4. Silent Data Exfiltration

The agent autonomously compiles the requested sensitive data (names, addresses, content from emails, possibly attachments) and sends it to a server controlled by the attacker. Crucially, this happens entirely from within OpenAI’s infrastructure. No data traverses the user’s local network or device in a way that typical security tools (endpoint detection, firewall logs, network monitoring) would catch.

5. No Visible Traces

From the victim’s perspective, everything appears normal. No alerts, no suspicious email activity, no log entries on the user’s side. The entire exploit plays out behind the scenes.

Radware’s researchers reported that by using encoding tricks (e.g. Base64) and carefully phrased constructs, they were able to evade many of the built-in safety filters that otherwise would reject suspicious URL calls or external requests.

In short: this vulnerability represented a stealthy, backend AI-level command-and-control mechanism cloaked in “normal” user requests.

Timeline: Disclosure, Patch, and Public Reveal

June 18, 2025

Radware reported the ShadowLeak vulnerability to OpenAI via responsible disclosure (through BugCrowd).

Early August 2025

OpenAI confirmed the issue was fixed.

September 3, 2025

OpenAI marked the issue as resolved publicly.

September 18, 2025

Radware published its full disclosure, blog post, and threat advisory about ShadowLeak.

October 16, 2025 (planned)

Radware is hosting a webinar to dive deeper into ShadowLeak and its implications.

According to multiple sources, OpenAI’s patch successfully prevents the ShadowLeak exploit from functioning.

Radware has since encouraged further vigilance and research into similar AI agent attack surfaces.

Why ShadowLeak Matters: Risks & Impact

1. Invisible to Traditional Defenses

Because the data exfiltration happens server-side, no anomalous traffic crosses user networks. No logs are generated on endpoints or firewalls. Organizations would struggle to detect an attack like this using standard cybersecurity tooling.

2. Precedent for Agent-Level Threats

ShadowLeak is a wake-up call: as AI agents grow more autonomous and integrated with enterprise systems (email, CRM, databases, file storage), they become higher-value targets themselves.

3. High Sensitivity and Compliance Risk

The kinds of data it could leak—names, contact info, documents, internal strategy—carry serious implications for privacy, compliance (GDPR, CCPA, etc.), and regulatory oversight.

4. Enterprise AI Adoption at Stake

OpenAI claims a few million paying business users; many rely on Deep Research (and similar agentic features) to automate insights from internal data sources. A vulnerability like this shakes confidence in AI tools handling sensitive business data.

5. Potential Future Variants

While ShadowLeak is patched, the attack model (indirect prompts, hidden instructions, backend execution) may inspire new exploits. Radware suggests there remains a “fairly large threat surface” yet undiscovered.

What OpenAI Did to Patch It

Although OpenAI has not publicly disclosed every internal mitigation (for security reasons), the key steps likely included:

Strengthening prompt sanitization

Parsing and filtering or rejecting hidden or obfuscated HTML/CSS instructions embedded in user data sources (emails, documents).

Behavioral alignment checks

Verifying that an autonomous agent’s actions remain consistent with the user’s explicit intent and rejecting deviations (e.g. stealthily sending data). Radware recommends continuous monitoring of agent intent versus activity.

Stricter tool-use constraints

Limiting or gating the use of functions like browser.open() that enable external HTTP requests, or requiring explicit user confirmation before outbound calls.

Comprehensive regression testing

Evaluating new adversarial prompt injection tests to ensure similar attack patterns no longer succeed.

Internal alerts and auditing

Adding logging and checks on AI agent operations at the server level to detect anomalous patterns, even if not visible externally.

Importantly, OpenAI has confirmed the patch is effective and that the vulnerability is resolved.

How Users & Organizations Should Respond

Even though ShadowLeak has been patched, its discovery offers lessons and measures to apply broadly when using AI agents that interface with sensitive data.

✅ Best Practices & Mitigations

1. Minimize permission scopes

Only grant agent access to data and services absolutely needed. Avoid blanket access to entire mailboxes or file systems.

2. Manual review for critical tasks

Avoid fully automating high-stakes actions (e.g. financial transfers, code deployments or publishing) without human oversight.

3. Sanitize and filter inputs

Before allowing an AI agent to parse documents or emails, strip HTML/CSS obfuscation and hidden layers (e.g. remove zero-opacity text).

4. Behavioral monitoring & intent alignment

Monitor agent actions in real time, comparing them against the user’s declared request. If the agent’s behavior diverges (e.g. sending data externally), block or revert.

5. Frequent audits and red teaming

Regularly test your AI integration with adversarial prompt injection techniques (including hidden commands) to spot weaknesses.

6. Stay updated & responsive

Keep the AI system, frameworks, and security libraries up to date. Stay vigilant for new disclosures in the AI security space.

7. Logging & forensics

Maintain detailed logs of agent activity (requests sent, external calls, time stamps) to support investigations if anomalies arise.

8. User awareness & training

Make teams aware that even invisible or annoyingly formatted content may carry hidden commands. Exercise caution when integrating AI agents with critical data.

⚠ What ShadowLeak Teaches Us

  • AI agents blur the line between user endpoints and cloud service logic; vulnerabilities may arise in unexpected layers.
  • Threat actors may increasingly target AI pipelines (prompt injection, agent misuse) rather than traditional web or network layers.
  • Even “safe” automation (email summarization, research agents) can be weaponized if underlying access is too permissive.
  • Security strategies for AI must evolve beyond perimeter and endpoint controls—monitoring and policy controls within the agent domain become essential.

Conclusion:

The ShadowLeak vulnerability in OpenAI’s ChatGPT Deep Research may now be resolved, but its discovery marks a turning point in AI security. This incident revealed how hidden prompt injections and service-side exfiltration can bypass traditional defenses, making AI agents themselves a high-risk attack surface.

Source:

https://www.securityweek.com/chatgpt-deep-research-targeted-in-server-side-data-theft-attack/

https://therecord.media/openai-fixes-zero-click-shadowleak-vulnerability

https://www.globenewswire.com/news-release/2025/09/18/3152766/0/en/MULTIMEDIA-UPDATE-Radware-Uncovers-First-Zero-Click-Service-Side-Vulnerability-in-ChatGPT.html

https://www.radware.com/security/threat-advisories-and-attack-reports/shadowleak/

https://www.malwarebytes.com/blog/news/2025/09/chatgpt-deep-research-zero-click-vulnerability-fixed-by-openai

https://thehackernews.com/2025/09/shadowleak-zero-click-flaw-leaks-gmail.html

Continue reading
View All
View All
Contact us

Get in touch with us

Whether you have a question, need support, or just want to learn more about Trevonix, our team is here to help.
Need help? Our support team is available 24/7 to assist you.
Interested in Trevonix for your business? Reach out to discuss pricing and solutions.
Send us a message
Tell us how we can help you.
chevron down icon
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

See It in Action

See how our approach works in real scenarios, not slides.
Book an IAM consultation to experience solutions shaped by real world use cases.