Mend.io Vulnerability Database
The largest open source vulnerability database
What is a Vulnerability ID?
New vulnerability? Tell us about it!
MAI-2024-0044
Published:May 16, 2026
Updated:May 16, 2026
Large Language Models (LLMs) are susceptible to jailbreak attacks that exploit Uncommon Text-Encoded Structures (UTES), which are infrequently encountered during the training phase. These structures, including formats such as JSON, tree representations, or LaTeX code, when embedded within prompts, can lead LLMs to circumvent established safety protocols and generate potentially harmful content. The vulnerability arises from the LLM's inherent challenges in processing and interpreting these atypical structures, compounded by the obfuscation of malicious instructions within the structured data. Mitigation steps: **For AI Developers:** * Implement comprehensive input sanitization and validation processes to detect and reject malicious structures at both structural and semantic levels. * Develop safety mechanisms that focus on complex or uncommon text structures, beyond traditional content filtering methods. **For Model Trainers/Fine-tuners:** * Expand training datasets to include diverse text structures and unusual inputs to enhance model robustness and generalization capabilities. * Employ adversarial training techniques to bolster model resilience against UTES-based jailbreak attacks.
Related Resources (1)
Do you need more information?
Contact Us
CVSS v4
Base Score:
6.9
Attack Vector
NETWORK
Attack Complexity
HIGH
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
LOW
Vulnerable System Integrity
LOW
Vulnerable System Availability
NONE
Subsequent System Confidentiality
NONE
Subsequent System Integrity
HIGH
Subsequent System Availability
NONE
CVSS v3
Base Score:
5.4
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality
LOW
Integrity
LOW
Availability
NONE
AIVSS
Base Score:
4.3