LMVD-ID: 8ed45cec
Published July 1, 2025

Adversarial LLM Internal Attack

Affected Models:llama 3.1-8b, qwen2.5-7b, mistral-8b, qwen2.5-14b, qwen2.5-32b

Research Paper

CAVGAN: Unifying Jailbreak and Defense of LLMs via Generative Adversarial Attacks on their Internal Representations

View Paper

Description: Large Language Models (LLMs) employing internal security mechanisms based on linearly separable embeddings in intermediate layers are vulnerable to a generative adversarial attack. The CAVGAN framework exploits this vulnerability by generating adversarial perturbations that misclassify malicious inputs as benign, allowing the attacker to bypass the LLM's safety filters and elicit harmful outputs.

Examples: See arXiv:2507.06043 for details and examples from the CAVGAN paper's experimental results. The paper provides specific examples of prompts and outputs demonstrating successful jailbreaks across multiple LLMs (Llama3.1-8B, Qwen2.5-7B, Mistral-8B).

Impact: Successful exploitation allows attackers to bypass LLM safety mechanisms, leading to the generation and dissemination of harmful content such as hate speech, instructions for illegal activities, or personally identifiable information. This compromises the integrity and reliability of the LLM and could have significant societal implications.

Affected Systems: Large Language Models (LLMs) that rely on linearly separable embedding representations in intermediate layers for security filtering are vulnerable. This may include, but is not limited to, various commercially available LLMs and research models. Specific models tested in the CAVGAN paper were Llama3.1-8B, Qwen2.5-7B and Mistral-8B.

Mitigation Steps:

  • Enhance LLM security mechanisms beyond simple linear separability in intermediate layer embeddings.
  • Investigate and implement more robust methods for detecting adversarial perturbations.
  • Develop and deploy advanced input sanitization techniques that are resilient to generative adversarial attacks.
  • Implement additional layers of security review even on seemingly benign outputs (post-processing).

© 2025 Promptfoo. All rights reserved.