AI Security Threat Feed

Latest CVEs affecting AI/ML systems, updated continuously. Tracked from NVD, GitHub Advisory, and CISA KEV.

1,604

AI/ML CVEs Tracked

225

Critical

79

New This Week

16

In CISA KEV

Latest AI Security Threats

Showing 20 of 766 results — Active exploitation, no patch
MEDIUM EXPLOIT AVAIL

A vulnerability was detected in langflow-ai langflow up to 1.8.3. The impacted element is the function get_client_ip/install_mcp_config of the file...

CVE-2026-6599
6.3
EPSS 0.0%
langflow CWE-74
LOW EXPLOIT AVAIL

A weakness has been identified in langflow-ai langflow up to 1.8.3. Impacted is the function remove_api_keys/has_api_terms of the file...

CVE-2026-6597
2.7
EPSS 0.0%
langflow CWE-255
CRITICAL EXPLOIT AVAIL

OpenAI Codex CLI: RCE via malicious MCP config files

CVE-2025-61260
9.8
EPSS 0.1%
Code Execution Supply Chain Agent Plugin
@openai/codex CWE-94 3.5K 5 ATLAS
HIGH EXPLOIT AVAIL

LiteLLM: RCE via bytecode rewriting in guardrails API

CVE-2026-40217
8.8
EPSS 0.2%
Code Execution Data Extraction Inference Framework API
litellm CWE-420 4 4 ATLAS
HIGH EXPLOIT AVAIL

PraisonAI: unauth WebSocket drains OpenAI API credits

CVE-2026-40116
7.5
EPSS 0.1%
Auth Bypass DoS Agent API
praisonai CWE-770 1 5 ATLAS
HIGH EXPLOIT AVAIL

PraisonAI: arg injection injects env vars into Cloud Run

CVE-2026-40113
8.4
EPSS 0.0%
Code Execution Supply Chain Auth Bypass Agent Framework
praisonai CWE-88 1 4 ATLAS
MEDIUM EXPLOIT AVAIL

PraisonAI: XSS via no-op HTML sanitizer in agent output

CVE-2026-40112
5.4
EPSS 0.0%
Prompt Injection Code Execution Data Extraction Agent Framework RAG
praisonai CWE-79 1 4 ATLAS
MEDIUM EXPLOIT AVAIL

openai-realtime-ui: SSRF in API proxy endpoint

CVE-2026-5803
6.3
EPSS 0.0%
Data Extraction Auth Bypass API
CWE-918 3 ATLAS
MEDIUM EXPLOIT AVAIL

lollms: sessions persist after password reset

CVE-2026-1163
4.1
EPSS 0.0%
Auth Bypass Data Extraction API Agent
lollms CWE-613 3 ATLAS
HIGH EXPLOIT AVAIL

text-generation-webui: unauthenticated path traversal file read

CVE-2026-35485
7.5
EPSS 0.4%
Data Extraction Auth Bypass Inference Framework
gradio CWE-22 674 3 ATLAS
MEDIUM EXPLOIT AVAIL

MLflow: auth bypass exposes model artifacts across experiments

CVE-2026-33866
--
EPSS 0.0%
Auth Bypass Data Extraction Framework Model
mlflow CWE-862 624 4 ATLAS
CRITICAL EXPLOIT AVAIL

Claude Code: OS command injection, credential theft

CVE-2026-35022
9.8
EPSS 0.5%
Code Execution Data Extraction Supply Chain Agent API Framework
CWE-78 8 ATLAS
HIGH EXPLOIT AVAIL

Claude Code CLI: shell injection enables RCE

CVE-2026-35021
7.8
EPSS 0.0%
Code Execution Supply Chain Agent Framework
CWE-78 5 ATLAS
HIGH EXPLOIT AVAIL

Claude Code CLI: OS command injection via TERMINAL env

CVE-2026-35020
8.4
EPSS 0.1%
Code Execution Supply Chain Agent API
claude-code CWE-78 5 ATLAS
UNKNOWN EXPLOIT AVAIL

KubeAI: RCE via shell injection in Ollama startup probe

CVE-2026-34940
--
EPSS 0.0%
Code Execution Inference Framework
CWE-78 3 ATLAS
CRITICAL EXPLOIT AVAIL

Budibase: Unauthenticated RCE as root via webhook

CVE-2026-35216
9.1
EPSS 0.6%
Code Execution Auth Bypass Data Extraction Framework Agent
CWE-78 8 ATLAS
HIGH EXPLOIT AVAIL

mobile-mcp: intent injection enables device control via AI agent

CVE-2026-35394
8.3
EPSS 0.0%
Prompt Injection Code Execution Privacy Violation Agent Plugin
CWE-939 6 ATLAS
CRITICAL EXPLOIT AVAIL

MLflow: auth bypass in job API enables unauthenticated RCE

CVE-2026-0545
9.1
EPSS 5.5%
Auth Bypass Code Execution DoS Framework Training Data
mlflow CWE-306 624 5 ATLAS
CRITICAL EXPLOIT AVAIL

MLflow: command injection via model_uri in mlserver mode

CVE-2026-0596
9.6
EPSS 0.2%
Code Execution Supply Chain Framework Inference
CWE-78 4 ATLAS 1 incident
HIGH EXPLOIT AVAIL

awesome-llm-apps MCP Agent: cross-session credential theft

CVE-2026-29872
8.2
EPSS 0.1%
Data Leakage Auth Bypass Privacy Violation Agent API Plugin
7 ATLAS

Need deeper analysis?

Get ATLAS technique mappings, compliance reports (ISO 42001, EU AI Act), breaking alerts, and full CISO analysis with a Pro subscription.

Start 14-Day Free Trial