Analysis of spam and virus filter logs showed no evidence of the exploit being used in the wild by malicious actors.
The attack required a specific sequence of actions to succeed, which limited its real-world viability: Proton Exploit
Ensure you are using the latest version of any Proton applications. Analysis of spam and virus filter logs showed
Proton Mail XSS Vulnerability: A Deep Dive into the 2022 Exploit Proton Exploit
Proton maintained its commitment to security through its Responsible Vulnerability Disclosure Policy .