Threat Intelligence
Table of Content
Codex for Everything Exfiltrates Connected Data
Codex for Everything was susceptible to data exfiltration via indirect prompt injection, exposing sensitive data from connected apps with no human-in-the-loop steps required.

Overview
‘Codex for Everything’ is an update to Codex that enables its use beyond coding, for day-to-day tasks. It includes over 90 new plugins and features, such as ‘browser use’ and ‘computer use’, that make Codex an all-purpose agent in a bid to compete with Anthropic’s Claude Cowork and Microsoft’s Copilot Cowork.
In this article, we demonstrate that a malicious email could manipulate Codex for Everything to exfiltrate the complete contents of other emails Codex was reviewing. Exfiltration occurred via outputting a malicious image, which triggered an automatic submission to an attacker-controlled Google form.
We demonstrate the vulnerability via an indirect prompt injection in an untrusted email, but an injection in any untrusted data source could exploit the vulnerability across Codex use cases.
This vulnerability was responsibly disclosed on April 21, 2026, and has been remediated by OpenAI. More details on the responsible disclosure are at the end of the article.
The Attack Chain
A user asks Codex for help reviewing emails

OpenAI's Email plugin comes with a Skill for triaging emails, and reviewing emails is part of a demonstrated use case in the Codex for Everything release.
A prompt injection is hidden in one of the emails Codex finds
The user’s inbox contains an email from an external party that includes a prompt injection.

Email content is not displayed to the user during Codex’s review process.
Codex is manipulated to output an insecure image, triggering data exfiltration
Codex is manipulated to generate and output Markdown image syntax that contains a pre-filled Google Form submission link, populated with the victim's email data. This automatically submits the victims' emails to an attacker-controlled Google Form.
No user interaction is required beyond submission of the initial email triage query.

The attacker can view the victim’s emails in their Google Form submissions
This attack exfiltrated sensitive emails, including legal correspondence, organizational financial planning, and security-related notifications.

Responsible Disclosure
This vulnerability was responsibly disclosed on Apr 21, 2026, and the vulnerability has been remediated by OpenAI.
Timeline
Apr 21, 2026 PromptArmor discloses to OpenAI via HackerOne
May 6, 2026 HackerOne requests additional details
May 6, 2026 PromptArmor follows up
May 14, 2026 HackerOne validates and triages the vulnerability
May 21, 2026 Public disclosure