ZDI-26-305: (0Day) OpenAI Codex Sandbox Escape Vulnerability
This vulnerability allows remote attackers to bypass the sandbox on affected installations of OpenAI Codex. User interaction is required to exploit this vulnerability in that the target must use Codex to process a repository containing malicious JavaScript. The ZDI has assigned a CVSS rating of 8.6.
ORIGINAL SOURCE →via Zero Day Initiative
ADVERTISEMENT
⚡ STAY AHEAD
Events like this, convergence-verified across 689 sources, land in your inbox every Sunday. Free.
GET THE SUNDAY BRIEFING →RELATED · cyber
- [CYBER] Brazilian LofyGang Resurfaces After Three Years With Minecraft LofyStealer Campaign
- [CYBER] Aave, Compound Unveil Technical Plan to Address Fallout From $290M Kelp DAO Hack
- [CYBER] Polymarket breach claim: xorcat alleges data leak affecting 300,000+ users
- [CYBER] Cyber Command, NSA chief warns foreign adversaries likely to target midterms
- [CYBER] Vimeo Confirms User and Customer Data Breach
- [CYBER] Video site Vimeo blames security incident on Anodot breach