Rated 9.8 out of 10 in severity, the flaw could allow a remote attacker to gain unauthorized access to applications.
The issue first appeared in May 2025, as Grok’s image tools expanded and early users began sharing screenshots of manipulated ...