Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
SOCs & MSSPs Prevent Phishing Missed Incidents Email
May 13, 2026
Fragnesia Linux Vulnerability Let Attackers Gain Root Privileges
May 13, 2026
Foxconn Confirms Cyberattack by Nitrogen Ransomware Gang
May 13, 2026
Home/CyberSecurity News/ChatGPT Flaws Exfiltrate Sensitive Data from Gmail
CyberSecurity News

ChatGPT Flaws Exfiltrate Sensitive Data from Gmail

Attackers can Exfiltrate Sensitive Data from connected services such as Gmail, Outlook, and GitHub by exploiting critical vulnerabilities in ChatGPT Flaws Exfiltrate Sensitivethe AI’s Connectors and...

David kimber
David kimber
January 8, 2026 2 Min Read
10 0

Attackers can Exfiltrate Sensitive Data from connected services such as Gmail, Outlook, and GitHub by exploiting critical vulnerabilities in ChatGPT Flaws Exfiltrate Sensitivethe AI’s Connectors and Memory features for zero-click attacks, persistence, and even propagation.​

OpenAI’s Connectors enable ChatGPT to integrate with external systems such as Gmail, Jira, GitHub, Teams, and Google Drive in a few clicks.

The Memory feature, enabled by default, stores user conversations and data for personalized responses, allowing the AI to read, edit, or delete entries.

While enhancing utility, these capabilities grant broad access to personal and corporate data, amplifying risks from inadequate safeguards.​

ChatGPT Zero-Click and One-Click Attacks

Attackers send malicious emails or share files embedding hidden instructions, invisible to users, via white text, tiny fonts, or footers.

ChatGPT Vulnerabilities Expose Sensitive Data
Attack Chain (Source: Radware)

In the zero-click server-side variant, ChatGPT scans the inbox during routine tasks like summarizing emails, executes the payload, and leaks data through OpenAI’s servers before users notice.

A one-click version triggers when victims upload tainted files, enabling chained attacks on connected repositories or drives.​

Attack Type Trigger Exfiltration Method Scope
Zero-Click Server-Side Shared a malicious file Via browser.open() tool on OpenAI servers Gmail inboxes, PII​
One-Click Server-Side Memory modification via a file Hidden prompts in docs​ Google Drive, GitHub​
Persistence (ZombieAgent) Memory modification via file Ongoing leaks per query ​ All chats, medical data​
Propagation Email address harvesting Auto-forward to contacts [query context] Organizational spread

OpenAI blocked dynamic URL modifications, but researchers bypassed this with pre-built URLs for each character (a-z, 0-9, $ for spaces).

ChatGPT normalizes sensitive strings like “Zvika Doe” to “zvikadoe”, then sequentially opens static links like compliance.hr-service.net/get-public-joke/z, exfiltrating data without construction. This service-side method evades client-side defenses, browsers, and UI visibility.​

For persistence, attackers inject memory-altering rules via files: on every message, read a specific attacker email and leak data first.

Despite OpenAI’s restrictions on mixing Connectors and Memory, reverse access works, enabling endless exfiltration even in new chats. Propagation scans inboxes for addresses, exfiltrates them, and attacker servers auto-send payloads, targeting organizations.​

Radware reported the issues on September 26, 2025, via BugCrowd, providing details and upgrades. OpenAI fixed ShadowLeak on September 3 and the full set on December 16, 2025, after reproduction.

Experts urge monitoring agent behaviors and sanitizing inputs, as agentic AI blind spots persist.​

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploit

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Trump Hints US Cyber Role in Caracas Blackout & Maduro Capture

Next Post

Microsoft Mandates MFA for Microsoft 365 Admin Center

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
iOS 26.5 Brings End-to-end Encrypted RCS Messaging Between iPhone
May 13, 2026
Critical Exim BDAT GnuTLS Flaw Vulnerability Enables
May 13, 2026
Google Boosts Android Mobile Security with New AI Protections
May 13, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us