Decoding Latent Attack Surfaces in LLMs: Prompt Injection via HTML in Web Summarization
Published on arXiv
2509.05831
Prompt Injection
OWASP LLM Top 10 — LLM01
Key Finding
Over 29% of adversarially injected HTML pages caused noticeable manipulation in Llama 4 Scout summaries; Gemma 9B IT showed a 15% success rate, exposing a broadly overlooked attack surface in LLM web pipelines.
HTML-based covert prompt injection
Novel technique introduced
Large Language Models (LLMs) are increasingly integrated into web-based systems for content summarization, yet their susceptibility to prompt injection attacks remains a pressing concern. In this study, we explore how non-visible HTML elements such as <meta>, aria-label, and alt attributes can be exploited to embed adversarial instructions without altering the visible content of a webpage. We introduce a novel dataset comprising 280 static web pages, evenly divided between clean and adversarial injected versions, crafted using diverse HTML-based strategies. These pages are processed through a browser automation pipeline to extract both raw HTML and rendered text, closely mimicking real-world LLM deployment scenarios. We evaluate two state-of-the-art open-source models, Llama 4 Scout (Meta) and Gemma 9B IT (Google), on their ability to summarize this content. Using both lexical (ROUGE-L) and semantic (SBERT cosine similarity) metrics, along with manual annotations, we assess the impact of these covert injections. Our findings reveal that over 29% of injected samples led to noticeable changes in the Llama 4 Scout summaries, while Gemma 9B IT showed a lower, yet non-trivial, success rate of 15%. These results highlight a critical and largely overlooked vulnerability in LLM driven web pipelines, where hidden adversarial content can subtly manipulate model outputs. Our work offers a reproducible framework and benchmark for evaluating HTML-based prompt injection and underscores the urgent need for robust mitigation strategies in LLM applications involving web content.
Key Contributions
- Novel dataset of 280 static web pages (clean vs. adversarial) with covert HTML-based prompt injections using meta tags, aria-labels, and alt attributes
- Browser automation pipeline that extracts both raw HTML and rendered text to simulate real-world LLM deployment for summarization
- Reproducible evaluation framework using ROUGE-L and SBERT cosine similarity metrics to quantify injection impact, revealing 29% success rate on Llama 4 Scout and 15% on Gemma 9B IT