Essentially, every website that the Grammarly user visits steals his or her authentication tokens. This allows the hacker to gain access to the user's account and all sorts of login data. Fortunately, the flaw was fixed on February 5th by the Grammarly Team - an impressive response time given the severity of the situation. An automatic update for all Grammarly users was immediately implemented.
A Grammarly spokesperson also told in an email that the company has no evidence of users being compromised by this vulnerability.
A Grammarly spokesperson admitted they had no evidence about the bug's existence but reassured users that the bug did not affect the Grammarly Keyboard, the Grammarly Microsoft Office add-on, or any typed text from other websites. If you are a Grammarly user, your software was automatically updated and requires no further action.
However, no matter how tight the online security of a software tool is, there are always workarounds. Someone will always find a way to bypass the security of a software tool and gain access to the user data. Any software written or supported by humans (which is most of it for the next decade at least) is subject to misconfiguration.
It's also important to consider the data your entering into Grammarly. If you're editing a note to your doctor or your financial planner, there's more risk. Writing a blog post about Grammarly doesn't carry the same risk. In fact, it's already fixed a few errors in this blog.
The Cloud Cover article describes a vulnerability in the Grammarly browser extension for Chrome and Firefox that exposed authentication tokens for roughly 22 million users. With only a few lines of JavaScript, attackers could potentially access personal documents and records tied to a user’s Grammarly account.
According to the article, the flaw was discovered on February 2 and patched by February 5, with an automatic update pushed to all Grammarly users. Grammarly stated they had no evidence of compromised accounts, and the bug did not affect the Grammarly Keyboard, Office add-in, or typed text from other sites.
The main lesson is that any browser extension or cloud service that reads your text can become a high-value target for malicious actors. Even reputable tools can have serious bugs, so you should:
The specific Grammarly bug discussed in the article was fixed quickly. However, Cloud Cover emphasizes that no software is perfectly secure—especially tools that process sensitive text. It’s “safe enough” if you: