CVE-2024-40594: ChatGPT macOS: cleartext conversation storage exposed
LOW PoC AVAILABLEThe ChatGPT macOS app (pre-July 2024) stored all user conversations as plaintext in a filesystem location readable by any other app on the system, bypassing macOS sandbox protections. If employees used the app to discuss sensitive projects, proprietary code, or client data, that content was silently accessible to any co-installed application or malicious script. Ensure all macOS endpoints have updated the app past 2024-07-05, audit ChatGPT usage policies for sensitive data sharing, and consider endpoint DLP rules covering AI tool conversation artifacts.
Risk Assessment
CVSS 2.3 understates the organizational privacy impact. While exploitation requires local access with high privileges (limiting remote attack surface), the sandbox opt-out means any app on the same macOS system can trivially read conversation files — no exploitation skill required. The real risk scales with how much sensitive corporate data employees feed into ChatGPT, which in 2024 is substantial. Organizations in regulated industries (finance, healthcare, legal) or with strict data residency obligations face disproportionate compliance exposure from this vulnerability.
Severity & Risk
Attack Surface
Recommended Action
6 steps-
Immediate: Verify ChatGPT macOS app is updated past 2024-07-05 across all endpoints using MDM (Jamf/Intune).
-
Locate and review existing plaintext conversation files before the fix (path was ~/Library/Application Support/com.openai.chat/conversations or equivalent) — assess if sensitive data was stored.
-
Clear conversation history via the app and remove any residual plaintext files from pre-patch versions.
-
Deploy DLP rules to flag or block exfiltration of files matching ChatGPT conversation patterns from macOS endpoints.
-
Establish and communicate an acceptable use policy for AI tools that explicitly prohibits sharing sensitive/regulated data.
-
For high-sensitivity environments, evaluate ChatGPT Enterprise (with data controls) or block the consumer app via network policy.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2024-40594?
The ChatGPT macOS app (pre-July 2024) stored all user conversations as plaintext in a filesystem location readable by any other app on the system, bypassing macOS sandbox protections. If employees used the app to discuss sensitive projects, proprietary code, or client data, that content was silently accessible to any co-installed application or malicious script. Ensure all macOS endpoints have updated the app past 2024-07-05, audit ChatGPT usage policies for sensitive data sharing, and consider endpoint DLP rules covering AI tool conversation artifacts.
Is CVE-2024-40594 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2024-40594, increasing the risk of exploitation.
How to fix CVE-2024-40594?
1. Immediate: Verify ChatGPT macOS app is updated past 2024-07-05 across all endpoints using MDM (Jamf/Intune). 2. Locate and review existing plaintext conversation files before the fix (path was ~/Library/Application Support/com.openai.chat/conversations or equivalent) — assess if sensitive data was stored. 3. Clear conversation history via the app and remove any residual plaintext files from pre-patch versions. 4. Deploy DLP rules to flag or block exfiltration of files matching ChatGPT conversation patterns from macOS endpoints. 5. Establish and communicate an acceptable use policy for AI tools that explicitly prohibits sharing sensitive/regulated data. 6. For high-sensitivity environments, evaluate ChatGPT Enterprise (with data controls) or block the consumer app via network policy.
What systems are affected by CVE-2024-40594?
This vulnerability affects the following AI/ML architecture patterns: llm api clients, endpoint ai tools, developer workstations.
What is the CVSS score for CVE-2024-40594?
CVE-2024-40594 has a CVSS v3.1 base score of 2.3 (LOW). The EPSS exploitation probability is 0.01%.
Technical Details
NVD Description
The OpenAI ChatGPT app before 2024-07-05 for macOS opts out of the sandbox, and stores conversations in cleartext in a location accessible to other apps.
Exploitation Scenario
An adversary with code execution on a target macOS system — via malicious app, browser exploit, or phishing payload — can enumerate the ChatGPT app's data directory and read all stored conversations in plaintext without any additional privilege escalation. A supply chain attack against a developer's machine could silently exfiltrate months of ChatGPT history (including source code, architecture discussions, API keys pasted for debugging) alongside other artifacts. Insider threat scenario: a disgruntled employee or contractor with standard user access installs a lightweight keylogger-style app that periodically copies the conversation database to an external server — requiring zero AI/ML expertise and no interaction with the ChatGPT app itself.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N References
Timeline
Related Vulnerabilities
CVE-2025-5120 10.0 smolagents: sandbox escape enables unauthenticated RCE
Same attack type: Data Leakage CVE-2026-33663 10.0 n8n: member role steals plaintext HTTP credentials
Same attack type: Data Leakage CVE-2025-53767 10.0 Azure OpenAI: SSRF EoP, no auth required (CVSS 10)
Same attack type: Privacy Violation CVE-2023-3765 10.0 MLflow: path traversal allows arbitrary file read
Same attack type: Data Leakage CVE-2026-25052 9.9 n8n: security flaw enables exploitation
Same attack type: Data Leakage
AI Threat Alert