AI Security Threat Feed

Latest CVEs affecting AI/ML systems, updated continuously. Tracked from NVD, GitHub Advisory, and CISA KEV.

1,604

AI/ML CVEs Tracked

225

Critical

78

New This Week

16

In CISA KEV

Latest AI Security Threats

Showing 20 of 910 results — Active exploitation
HIGH EXPLOIT AVAIL

PyTorch: DoS via cummin+Inductor NameError in 2.7.0

CVE-2025-55557
7.5
EPSS 0.1%
DoS Framework
pytorch 21.7K 3 ATLAS
MEDIUM EXPLOIT AVAIL

TensorFlow: non-deterministic compilation breaks Embedding

CVE-2025-55556
6.5
EPSS 0.0%
Supply Chain DoS Framework Inference
tensorflow 3.7K 3 ATLAS
MEDIUM EXPLOIT AVAIL

PyTorch: integer overflow in nan_to_num causes DoS

CVE-2025-55554
5.3
EPSS 0.1%
DoS Supply Chain Framework Inference
pytorch 21.7K 3 ATLAS
HIGH EXPLOIT AVAIL

PyTorch 2.7.0: DoS via proxy_tensor.py syntax error

CVE-2025-55553
7.5
EPSS 0.1%
DoS Supply Chain Framework Inference
pytorch 21.7K 3 ATLAS
HIGH EXPLOIT AVAIL

PyTorch: integer overflow in rot90+randn_like causes DoS

CVE-2025-55552
7.5
EPSS 0.1%
DoS Supply Chain Framework Inference
pytorch CWE-190 21.7K 3 ATLAS
HIGH EXPLOIT AVAIL

PyTorch: DoS in linalg.lu via malformed slice op

CVE-2025-55551
7.5
EPSS 0.1%
DoS Framework Inference
pytorch 21.7K 4 ATLAS
HIGH EXPLOIT AVAIL

Transformers: ReDoS in optimizer halts training pipelines

CVE-2025-6921
7.5
EPSS 0.0%
DoS Framework Training Data
transformers CWE-400 7.8K 4 ATLAS
UNKNOWN EXPLOIT AVAIL

OpenAI Codex CLI: sandbox escape via model-generated cwd

CVE-2025-59532
--
EPSS 0.1%
Code Execution Supply Chain Prompt Injection Agent
5 ATLAS
CRITICAL EXPLOIT AVAIL

Flowise: Unauthenticated RCE via MCP config injection

CVE-2025-59528
10.0
EPSS 83.9%
Code Execution Supply Chain Agent Framework Plugin
flowise 5 ATLAS
HIGH EXPLOIT AVAIL

Flowise: unauthenticated SSRF exposes internal network

CVE-2025-59527
7.5
EPSS 0.1%
Data Extraction Privacy Violation Agent Framework
flowise 4 ATLAS
CRITICAL EXPLOIT AVAIL

Flowise Cloud: cross-tenant env var exposure leaks API keys

CVE-2025-59434
9.6
EPSS 0.1%
Data Extraction Auth Bypass Privacy Violation Framework API Agent
6 ATLAS
HIGH EXPLOIT AVAIL

Keras: safe_mode bypass enables RCE via model load

CVE-2025-9906
7.3
EPSS 0.1%
Code Execution Supply Chain Framework Model
keras CWE-502 1.5K 6 ATLAS
HIGH EXPLOIT AVAIL

Keras: safe_mode bypass enables RCE via .h5 model files

CVE-2025-9905
7.3
EPSS 0.0%
Code Execution Supply Chain Framework Model
keras CWE-913 1.5K 5 ATLAS
HIGH EXPLOIT AVAIL

picklescan: file extension bypass allows model RCE

CVE-2025-10155
7.8
EPSS 0.1%
Supply Chain Code Execution Model Framework
picklescan CWE-20 3 5 ATLAS
MEDIUM EXPLOIT AVAIL

Transformers: ReDoS in EnglishNormalizer exhausts CPU

CVE-2025-6051
5.3
EPSS 0.0%
DoS Framework Inference
transformers CWE-1333 7.8K 4 ATLAS
CRITICAL EXPLOIT AVAIL SCANNER

Flowise: auth bypass in reset flow allows full ATO

CVE-2025-58434
9.8
EPSS 21.0%
Auth Bypass Data Extraction Agent Framework
flowise 5 ATLAS
CRITICAL EXPLOIT AVAIL

langchaingo: Jinja2 SSTI allows host filesystem read

CVE-2025-9556
9.8
EPSS 0.1%
Code Execution Data Extraction Framework Agent
5 ATLAS
HIGH EXPLOIT AVAIL

HuggingFace Transformers: ReDoS in MarianTokenizer

CVE-2025-6638
7.5
EPSS 0.0%
DoS Supply Chain Framework Inference
transformers CWE-1333 7.8K 4 ATLAS
HIGH EXPLOIT AVAIL

Picklescan: CRC bypass hides malicious pickle in ZIP

CVE-2025-10156
7.5
EPSS 1.0%
Supply Chain Code Execution Model Framework
picklescan Patch: 0.0.31 CWE-693 3 5 ATLAS 1 incident
HIGH EXPLOIT AVAIL

PickleScan: subclass bypass enables malicious model RCE

CVE-2025-10157
8.3
EPSS 0.2%
Supply Chain Code Execution Model Framework
picklescan Patch: 0.0.31 CWE-693 3 5 ATLAS 1 incident

Need deeper analysis?

Get ATLAS technique mappings, compliance reports (ISO 42001, EU AI Act), breaking alerts, and full CISO analysis with a Pro subscription.

Start 14-Day Free Trial