Mistral LeChat Data Exfiltration via Email Embedded Indirect Prompt Injection
Case GUID: f80b23c1-26cb-4484-8ea2-0e7a82867931Summary
An indirect prompt injection vulnerability has been discovered affecting Mistral LeChat. The specific flaw exploits the model's instruction processing by embedding malicious commands within an email destined to a victim that leverages LeChats email capabilities. Base64 encoding is leveraged to exfiltrate conversation data and network identifiers (i.e: IP address, browser user-agent) to attacker controlled URLs.
Unlock the Full Intelligence Report
This disclosure is part of the 0DIN Threat Feed. Customers get access to:
Metadata
Social Impact Score
Level 1: Minimal Risk
The violation poses very low societal risk, limited primarily to nuisance or minor policy breaches. Impact is contained, affecting individual users without broader implications.
Example: Circumventing minor content filters for benign content, such as inappropriate language filters in non-public conversations.
Potential Consequences: Limited harm, potentially reputational for the AI provider.
Taxonomies
About 0Din.ai
The 0Day Investigative Network (0DIN) was founded by Mozilla in 2024 to reward responsible researchers for their efforts in securing GenAI models. Learn more and submit discoveries at https://0din.ai.
Automate Your AI Security Testing
This vulnerability was discovered through 0DIN's bug bounty program. Want to find issues like this in your own models? 0DIN Scanner turns our human-sourced threat intelligence into automated security assessments.
Derived from real bug bounties and security research
OpenAI, Azure, Anthropic, AWS Bedrock, and more
Run recurring scans with real-time monitoring
Attack Success Rate (ASR) scoring with 90-day trend analysis
Severity
Low
Security Boundary
Guardrail Jailbreak
Models
Mistral Mistral Large
Published On
2026-03-05 (13 days)
Credit
neuroXploit