Skip to content

Hide Navigation Hide TOC

ChatGPT DOM JavaScript Redirect and UI Spoofing Injection - ATR-2026-00378 (a0d84f5c-06a0-5002-8932-581bb1372f80)

Detects ChatGPT DOM manipulation JavaScript from garak DanInTheWild corpus (#360). Injects JavaScript that redirects to the ChatGPT paid model URL (text-davinci-002-render-paid), removes legitimate UI elements via document.querySelector CSS selectors, and injects spoofed "ChatGPT Plus" branding with "made by aci25#9869 (bypasss)" attribution. This is a UI spoofing attack combining window.location.href redirect manipulation with DOM element removal and replacement, targeting the ChatGPT web interface to deceive users about authentication state.

Cluster A Galaxy A Cluster B Galaxy B Level
ChatGPT DOM JavaScript Redirect and UI Spoofing Injection - ATR-2026-00378 (a0d84f5c-06a0-5002-8932-581bb1372f80) Agent Threat Rules LLM Prompt Injection (19cd2d12-66ff-487c-a05c-e058b027efc9) MITRE ATLAS Attack Pattern 1
ChatGPT DOM JavaScript Redirect and UI Spoofing Injection - ATR-2026-00378 (a0d84f5c-06a0-5002-8932-581bb1372f80) Agent Threat Rules LLM Jailbreak (172427e3-9ecc-49a3-b628-96b824cc4131) MITRE ATLAS Attack Pattern 1