| Impact | Details |
|---|---|
|
Execute Unauthorized Code or Commands; Varies by Context |
Scope: Integrity
In an agent-oriented setting, output could be used to cause unpredictable agent invocation, i.e., to control or influence agents that might be invoked from the output. The impact varies depending on the access that is granted to the tools, such as creating a database or writing files. |
| Phase(s) | Mitigation |
|---|---|
|
Architecture and Design |
Since the output from a generative AI component (such as an LLM) cannot be trusted, ensure that it operates in an untrusted or non-privileged space.
|
|
Operation |
Use "semantic comparators," which are mechanisms that
provide semantic comparison to identify objects that might appear
different but are semantically similar.
|
|
Operation |
Use components that operate externally to the system to monitor the output and act as a moderator. These components are called different terms, such as supervisors or guardrails. |
|
Build and Compilation |
During model training, use an appropriate variety of good and bad examples to guide preferred outputs. |
| Nature | Type | ID | Name |
|---|---|---|---|
| ChildOf | Pillar Pillar - a weakness that is the most abstract type of weakness and represents a theme for all class/base/variant weaknesses related to it. A Pillar is different from a Category as a Pillar is still technically a type of weakness that describes a mistake, while a Category represents a common characteristic used to group related things. | 707 | Improper Neutralization |
| Phase | Note |
|---|---|
| Architecture and Design | Developers may rely heavily on protection mechanisms such as input filtering and model alignment, assuming they are more effective than they actually are. |
| Implementation | Developers may rely heavily on protection mechanisms such as input filtering and model alignment, assuming they are more effective than they actually are. |
Class: Not Language-Specific (Undetermined Prevalence)
Class: Not Architecture-Specific (Undetermined Prevalence)
AI/ML (Undetermined Prevalence)
Class: Not Technology-Specific (Undetermined Prevalence)
Note: this is a curated list of examples for users to understand the variety of ways in which this weakness can be introduced. It is not a complete list of all CVEs that are related to this CWE entry.
| Reference | Description |
|---|---|
| Method | Details |
|---|---|
|
Dynamic Analysis with Manual Results Interpretation |
Use known techniques for prompt injection
and other attacks, and adjust the attacks to be more
specific to the model or system.
|
|
Dynamic Analysis with Automated Results Interpretation |
Use known techniques for prompt injection
and other attacks, and adjust the attacks to be more
specific to the model or system.
|
|
Architecture or Design Review |
Review of the product design can be
effective, but it works best in conjunction with dynamic
analysis.
|
| Nature | Type | ID | Name |
|---|---|---|---|
| MemberOf | CategoryCategory - a CWE entry that contains a set of other entries that share a common characteristic. | 1409 | Comprehensive Categorization: Injection |
| Usage |
DISCOURAGED
(this CWE ID should not be used to map to real-world vulnerabilities)
|
||||||||
| Reasons | Potential Major Changes, Frequent Misinterpretation | ||||||||
|
Rationale |
There is potential for this CWE entry to be modified in the future for further clarification as the research community continues to better understand weaknesses in this domain. | ||||||||
|
Comments |
This CWE entry is only related to "validation" of output and might be used mistakenly for other kinds of output-related weaknesses. Careful attention should be paid to whether this CWE should be used for vulnerabilities related to "prompt injection," which is an attack that works against many different weaknesses. See Maintenance Notes and Research Gaps. Analysts should closely investigate the root cause to ensure it is not ultimately due to other well-known weaknesses. The following suggestions are not comprehensive. |
||||||||
|
Suggestions |
|
Research Gap
Maintenance
| Submissions | ||
|---|---|---|
| Submission Date | Submitter | Organization |
|
2024年07月02日
(CWE 4.15, 2024年07月16日) |
Members of the CWE AI WG | CWE Artificial Intelligence (AI) Working Group (WG) |
Use of the Common Weakness Enumeration (CWE™) and the associated references from this website are subject to the Terms of Use. CWE is sponsored by the U.S. Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) and managed by the Homeland Security Systems Engineering and Development Institute (HSSEDI) which is operated by The MITRE Corporation (MITRE). Copyright © 2006–2025, The MITRE Corporation. CWE, CWSS, CWRAF, and the CWE logo are trademarks of The MITRE Corporation.