A critical AI browser prompt injection vulnerability has been identified and patched in Opera Neon, highlighting a persistent and serious security challenge for agentic browsers. This flaw allowed attackers to exploit the browser's AI assistant through hidden webpage elements, leading to the extraction and exfiltration of sensitive user data. The incident underscores the urgent need for new security paradigms as AI capabilities integrate deeper into browsing experiences.
The attack leveraged hidden HTML elements, such as zero-opacity span tags, to embed malicious instructions within a webpage. When a user prompted Opera Neon's AI assistant to summarize or analyze the page, the browser's underlying large language model (LLM) processed the entire HTML structure, including these invisible commands. These injected instructions could then direct the AI to perform unauthorized actions, like navigating to an authenticated user's Opera account page, extracting their email address, and leaking it to a third-party server. According to the announcement, this demonstrates a profound breakdown in how AI browsers differentiate trusted user input from untrusted page content.
