diff --git a/ee/lib/gitlab/llm/templates/explain_vulnerability.rb b/ee/lib/gitlab/llm/templates/explain_vulnerability.rb
index f607cc8a87a3960b974832c3b4ad0c02085d024c..2284b5a701720a27545bfdc470d856cd98c95215 100644
--- a/ee/lib/gitlab/llm/templates/explain_vulnerability.rb
+++ b/ee/lib/gitlab/llm/templates/explain_vulnerability.rb
@@ -98,7 +98,7 @@ def eligible_code?
         def prompt_with_code
           <<~PROMPT
           You are a software vulnerability developer.
-          Explain the vulnerability "#{title} - #{description} (#{identifiers})".
+          Explain the vulnerability "#{title} - (#{identifiers})".
           The file "#{filename}" has this vulnerable code:
 
           ```
@@ -116,7 +116,7 @@ def prompt_without_code
 
           <<~PROMPT
           You are a software vulnerability developer.
-          Explain the vulnerability "#{title} - #{description} (#{identifiers})".
+          Explain the vulnerability "#{title} - (#{identifiers})".
           The vulnerable code is in the file "#{filename}".
           Provide a code example with syntax highlighting on how an attacker can take advantage of the vulnerability.
           Provide a code example with syntax highlighting on how to fix it.
@@ -127,7 +127,7 @@ def prompt_without_code
         def prompt_without_file_or_code
           <<~PROMPT
           You are a software vulnerability developer.
-          Explain the vulnerability "#{title} - #{description} (#{identifiers})".
+          Explain the vulnerability "#{title} - (#{identifiers})".
           Provide a code example with syntax highlighting on how an attacker can take advantage of the vulnerability.
           Provide a code example with syntax highlighting on how to fix it.
           Provide the response in markdown format with headers.
diff --git a/ee/spec/lib/gitlab/llm/templates/explain_vulnerability_spec.rb b/ee/spec/lib/gitlab/llm/templates/explain_vulnerability_spec.rb
index b00ef620a3f488398889b121405e7c16dd339ce7..186150a3859acbcbe0b5aceaccb180bdccd27ddb 100644
--- a/ee/spec/lib/gitlab/llm/templates/explain_vulnerability_spec.rb
+++ b/ee/spec/lib/gitlab/llm/templates/explain_vulnerability_spec.rb
@@ -86,10 +86,6 @@
           expect(subject.to_prompt).to include(vulnerability.title)
         end
 
-        it 'includes the description' do
-          expect(subject.to_prompt).to include(vulnerability.description)
-        end
-
         it 'includes the identifiers' do
           expect(subject.to_prompt).to include(identifiers)
         end
@@ -105,7 +101,7 @@
         it 'customizes the prompt' do
           expect(subject.to_prompt).to eq(<<~PROMPT)
           You are a software vulnerability developer.
-          Explain the vulnerability "#{vulnerability.title} - #{vulnerability.description} (#{identifiers})".
+          Explain the vulnerability "#{vulnerability.title} - (#{identifiers})".
           The file "#{File.basename(vulnerability.file)}" has this vulnerable code:
 
           ```
@@ -238,7 +234,7 @@
         let(:expected) do
           <<~PROMPT
           You are a software vulnerability developer.
-          Explain the vulnerability "#{vulnerability.title} - #{vulnerability.description} (#{identifiers})".
+          Explain the vulnerability "#{vulnerability.title} - (#{identifiers})".
           The vulnerable code is in the file "#{File.basename(vulnerability.file)}".
           Provide a code example with syntax highlighting on how an attacker can take advantage of the vulnerability.
           Provide a code example with syntax highlighting on how to fix it.
@@ -268,7 +264,7 @@
       let(:expected) do
         <<~PROMPT
         You are a software vulnerability developer.
-        Explain the vulnerability "#{vulnerability.title} - #{vulnerability.description} (#{identifiers})".
+        Explain the vulnerability "#{vulnerability.title} - (#{identifiers})".
         Provide a code example with syntax highlighting on how an attacker can take advantage of the vulnerability.
         Provide a code example with syntax highlighting on how to fix it.
         Provide the response in markdown format with headers.
diff --git a/ee/spec/requests/api/graphql/explain_vulnerability_prompt_spec.rb b/ee/spec/requests/api/graphql/explain_vulnerability_prompt_spec.rb
index 01145b6fe696de46a0fb74856c91fd9ee82ae41a..eb3e8073dcc99eaf1f39aa36f89890715f8fa459 100644
--- a/ee/spec/requests/api/graphql/explain_vulnerability_prompt_spec.rb
+++ b/ee/spec/requests/api/graphql/explain_vulnerability_prompt_spec.rb
@@ -103,7 +103,7 @@
           is_expected.to eq(
             <<~PROMPT
               You are a software vulnerability developer.
-              Explain the vulnerability \"#{vulnerability.title} - #{vulnerability.description} ()\".
+              Explain the vulnerability \"#{vulnerability.title} - ()\".
               The file \"main.c\" has this vulnerable code:
 
               ```
@@ -135,7 +135,7 @@
           is_expected.to eq(
             <<~PROMPT
               You are a software vulnerability developer.
-              Explain the vulnerability \"#{vulnerability.title} - #{vulnerability.description} ()\".
+              Explain the vulnerability \"#{vulnerability.title} - ()\".
               The vulnerable code is in the file "main.c".
               Provide a code example with syntax highlighting on how an attacker can take advantage of the vulnerability.
               Provide a code example with syntax highlighting on how to fix it.
@@ -152,7 +152,7 @@
           is_expected.to eq(
             <<~PROMPT
               You are a software vulnerability developer.
-              Explain the vulnerability \"#{vulnerability.title} - #{vulnerability.description} (CVE-2018-1234)\".
+              Explain the vulnerability \"#{vulnerability.title} - (CVE-2018-1234)\".
               The vulnerable code is in the file "App.java".
               Provide a code example with syntax highlighting on how an attacker can take advantage of the vulnerability.
               Provide a code example with syntax highlighting on how to fix it.