Skip to main content
radar

Radar #17: Week of 01/12/2026

The Low Orbit Security Radar is a weekly security newsletter from an offensive practitioner's perspective with curated news stories and links worth your time.

Graham Helton

News


Notion fixed a indirect prompt injection vulnerability after it was publicly disclosed

Researchers at PromptArmor identified an indirect prompt injection vulnerability in Notion. This vulnerability allowed researchers to manipulate the Notion AI to insert a malicious image into a document. The images that were inserted were specifically crafted by the prompt to send all of the information in a user's notion page to a domain the attacker controlled.

Once this document is uploaded with the malicious prompt embedded into it, the data in the page is automatically exfiltrated to the attacker's domain by setting the page data as URL parameters.

Source: https://www.promptarmor.com/resources/notion-ai-unpatched-data-exfiltration

This is a cool example of a prompt injection in the wild, if you know of more, especially ones that actually led to a breach, please send them my way. While this is interesting on it's own, what really caught my eye was the disclosure timeline for the report.

Source: https://www.promptarmor.com/resources/notion-ai-unpatched-data-exfiltration

First, the disclosure timeline is REALLY small, especially for being submitted over the holidays. However what was most interesting was this report was submitted to HackerOne and closed as non-applicable. About one week later, PromptArmor disclosed the vulnerability publicly and, on the same day, Notion reached out and implemented a remediation to the vulnerability.

This continues to demonstrate the value of public disclosure. Had this not been publicly disclosed, the vulnerability would still exist in Notion. I hope the researchers at PromptArmor got the bug bounty payout from HackerOne considering there were code changes implemented because of the report.

Caught My Eye