Mend.io Vulnerability Database
The largest open source vulnerability database
What is a Vulnerability ID?
New vulnerability? Tell us about it!
MAI-2023-0002
Published:May 16, 2026
Updated:May 16, 2026
The HouYi Prompt Injection vulnerability represents a critical security flaw within applications that integrate Large Language Models (LLMs). This vulnerability arises when attackers craft malicious prompts that can override the intended functionality of the application. By manipulating these prompts, attackers can cause the LLM to interpret harmful payloads as legitimate instructions rather than mere data inputs. Consequently, this can lead to unintended actions such as data leakage, unauthorized use of the LLM, or the application acting in a deceptive manner. The vulnerability exploits the mechanism by which user inputs are amalgamated with existing prompts within the application, highlighting the need for robust input validation and prompt sanitization. Mitigation steps: **For AI Developers:** * Implement robust input sanitization and validation mechanisms to prevent malicious prompts from being misinterpreted as actionable instructions. * Regularly update and patch applications to mitigate known vulnerabilities and enhance security. * Conduct thorough security testing of applications integrated with LLMs to identify and rectify potential vulnerabilities. **For Model Trainers/Fine-tuners:** * Utilize techniques such as instruction defense, post-prompting, random sequence enclosure, sandwich defense, and XML tagging to safeguard against prompt injection vulnerabilities. * Employ separate evaluation of LLM outputs to filter and mitigate potentially adversarial prompts.
Related Resources (1)
Do you need more information?
Contact Us
CVSS v4
Base Score:
8.8
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
LOW
Vulnerable System Availability
NONE
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
8.2
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
LOW
Availability
NONE
AIVSS
Base Score:
4.8