AI Security Threat Feed

Latest CVEs affecting AI/ML systems, updated continuously. Tracked from NVD, GitHub Advisory, and CISA KEV.

1,604

AI/ML CVEs Tracked

225

Critical

78

New This Week

16

In CISA KEV

Latest AI Security Threats

Showing 20 of 910 results — Active exploitation
MEDIUM EXPLOIT AVAIL

PyTorch: lstm_cell memory corruption, local code exec

CVE-2025-3001
5.3
EPSS 0.1%
Code Execution DoS Framework
pytorch 21.9K 3 ATLAS
MEDIUM EXPLOIT AVAIL

PyTorch: memory corruption in torch.jit.script compiler

CVE-2025-3000
5.3
EPSS 0.1%
Code Execution Supply Chain Framework Inference
pytorch 21.9K 3 ATLAS
MEDIUM EXPLOIT AVAIL

PyTorch: memory corruption in RNN sequence unpacking

CVE-2025-2999
5.3
EPSS 0.1%
Code Execution Data Extraction Supply Chain Framework Training Data Inference
pytorch 21.9K 3 ATLAS
MEDIUM EXPLOIT AVAIL

PyTorch: memory corruption in RNN pad_packed_sequence

CVE-2025-2998
5.3
EPSS 0.1%
Code Execution Supply Chain DoS Framework Training Data
pytorch 21.9K 3 ATLAS
MEDIUM EXPLOIT AVAIL

PyTorch: DoS via mkldnn_max_pool2d resource leak

CVE-2025-2953
5.5
EPSS 0.1%
DoS Supply Chain Framework Inference Model
pytorch CWE-404 21.9K 3 ATLAS
MEDIUM EXPLOIT AVAIL

openairinterface5g: segfault enables DoS via crafted UE message

CVE-2025-26265
6.5
EPSS 0.9%
DoS Inference
openairinterface5g 13.8K 2 ATLAS
CRITICAL EXPLOIT AVAIL

InvokeAI: RCE via unsafe torch.load deserialization

CVE-2024-12029
9.8
EPSS 44.2%
Code Execution Supply Chain Framework Model
CWE-502 5 ATLAS
HIGH EXPLOIT AVAIL

LiteLLM: Langfuse API key leak via error handling

CVE-2025-0330
7.5
EPSS 0.5%
Data Leakage Auth Bypass Data Extraction Framework API Inference
litellm CWE-1230 4 4 ATLAS
MEDIUM EXPLOIT AVAIL

SageMaker SDK: MD5 collision silently replaces ML workflows

CVE-2025-0508
5.9
EPSS 0.1%
Supply Chain Model Poisoning Framework Training Data
sagemaker Patch: 2.237.3 CWE-328 51 3 ATLAS
HIGH EXPLOIT AVAIL

litellm: privilege escalation viewer→proxy admin via bad API key

CVE-2025-0628
8.1
EPSS 0.3%
Auth Bypass Data Extraction API Framework
litellm Patch: 1.61.15 CWE-266 4 4 ATLAS
HIGH EXPLOIT AVAIL

litellm: unauthenticated DoS via multipart boundary parsing

CVE-2024-8984
7.5
EPSS 0.6%
DoS API Framework Inference
litellm Patch: 1.56.2 CWE-400 4 3 ATLAS
HIGH EXPLOIT AVAIL

open-webui: unauthenticated DoS via markdown parser

CVE-2024-7983
7.5
EPSS 0.4%
DoS Auth Bypass API Framework
open-webui CWE-400 3 ATLAS
HIGH EXPLOIT AVAIL

OpenWebUI: path traversal RCE via audio upload API

CVE-2024-8060
8.1
EPSS 2.1%
Code Execution Data Extraction Framework API
open-webui Patch: 0.5.17 CWE-22 5 ATLAS
HIGH EXPLOIT AVAIL

pytorch-lightning: unauthenticated DoS crashes LightningApp

CVE-2024-8020
7.5
EPSS 0.1%
DoS Framework API
pytorch-lightning CWE-248 1.6K 3 ATLAS
HIGH EXPLOIT AVAIL

open-webui: Stored XSS enables admin session hijack

CVE-2024-7990
8.4
EPSS 0.3%
Code Execution Data Extraction Auth Bypass Framework API
open-webui CWE-79 3 ATLAS
HIGH EXPLOIT AVAIL

Open-WebUI: unauthenticated PDF endpoint enables DoS

CVE-2024-8053
7.5
EPSS 0.7%
Auth Bypass DoS API Inference
open-webui CWE-287 3 ATLAS
HIGH EXPLOIT AVAIL

Open-WebUI: CSRF enables RCE via pipeline code injection

CVE-2024-7806
8.0
EPSS 1.8%
Code Execution Auth Bypass Framework API
open-webui Patch: 0.3.33 CWE-352 6 ATLAS
HIGH EXPLOIT AVAIL

open-webui: XSS enables admin session hijack via chat

CVE-2024-7053
7.6
EPSS 0.2%
Auth Bypass Code Execution Data Extraction Framework API
open-webui CWE-79 6 ATLAS
CRITICAL EXPLOIT AVAIL

pytorch-lightning: file upload RCE (Windows)

CVE-2024-8019
9.1
EPSS 2.1%
Code Execution Supply Chain Framework Training Data
pytorch-lightning Patch: 2.4.0 CWE-434 1.6K 4 ATLAS
MEDIUM EXPLOIT AVAIL

Open WebUI: missing authz leaks admin credentials

CVE-2024-7046
4.3
EPSS 0.2%
Auth Bypass Data Extraction Privacy Violation API Framework
open-webui CWE-475 3 ATLAS

Need deeper analysis?

Get ATLAS technique mappings, compliance reports (ISO 42001, EU AI Act), breaking alerts, and full CISO analysis with a Pro subscription.

Start 14-Day Free Trial