AI Security Threat Feed

Latest CVEs affecting AI/ML systems, updated continuously. Tracked from NVD, GitHub Advisory, and CISA KEV.

1,604

AI/ML CVEs Tracked

225

Critical

79

New This Week

16

In CISA KEV

Latest AI Security Threats

Showing 20 of 144 results — Active exploitation, has patch
HIGH EXPLOIT AVAIL

Marked Vulnerable to OOM Denial of Service via Infinite Recursion in marked Tokenizer

CVE-2026-41680
7.5
EPSS 0.1%
marked Patch: 18.0.2 CWE-400 3.9K
MEDIUM EXPLOIT AVAIL

A vulnerability was found in vllm up to 0.19.0. The affected element is the function has_mamba_layers of the file vllm/v1/kv_cache_interface.py of the...

CVE-2026-7141
5.6
EPSS 0.1%
vllm Patch: 0.19.1 CWE-908 126
CRITICAL EXPLOIT AVAIL

Flowise: CSV Agent Prompt Injection Remote Code Execution Vulnerability

CVE-2026-41264
9.8
EPSS 0.3%
flowise-components Patch: 3.1.0 CWE-184
MEDIUM EXPLOIT AVAIL

A security vulnerability has been detected in langflow-ai langflow up to 1.8.3. The affected element is the function create_project/encrypt_auth_settings of...

CVE-2026-6598
4.3
EPSS 0.0%
langflow Patch: 1.9.1 CWE-312
HIGH EXPLOIT AVAIL

A security flaw has been discovered in langflow-ai langflow up to 1.1.0. This issue affects the function create_upload_file of the file...

CVE-2026-6596
7.3
EPSS 0.1%
langflow-base Patch: 1.9.1 CWE-284
CRITICAL EXPLOIT AVAIL

Flowise: RCE via MCP stdio command injection

CVE-2026-40933
9.9
EPSS 0.0%
Code Execution Supply Chain Auth Bypass Agent Plugin Framework
flowise-components Patch: 3.1.0 CWE-78 7 ATLAS
HIGH EXPLOIT AVAIL

Keras: safe_mode bypass allows RCE via model deserialization

CVE-2026-1462
8.8
EPSS 0.1%
Supply Chain Code Execution Framework Model
keras Patch: 3.13.2 CWE-502 1.5K 4 ATLAS
MEDIUM EXPLOIT AVAIL

langsmith: prototype pollution enables auth bypass, RCE

CVE-2026-40190
5.6
EPSS 0.1%
Supply Chain Auth Bypass Code Execution Framework Agent Plugin
langsmith Patch: 0.5.18 CWE-1321 2.6K 4 ATLAS
MEDIUM EXPLOIT AVAIL

rembg: path traversal exposes arbitrary files via HTTP API

CVE-2026-40086
5.3
EPSS 0.1%
Data Extraction Privacy Violation Inference API
rembg Patch: 2.0.75 CWE-22 1.1K 4 ATLAS
HIGH EXPLOIT AVAIL

PraisonAI: unauthenticated SSRF via unvalidated webhook_url

CVE-2026-40114
7.2
EPSS 0.0%
Auth Bypass Data Extraction Privacy Violation Agent API
PraisonAI Patch: 4.5.128 CWE-918 1 4 ATLAS
HIGH EXPLOIT AVAIL

praisonaiagents: SSRF in web_crawl exposes cloud metadata

CVE-2026-40160
--
EPSS 0.0%
Data Extraction Prompt Injection Agent Plugin
praisonaiagents Patch: 1.5.128 CWE-918 11 6 ATLAS
MEDIUM EXPLOIT AVAIL

PraisonAI: MCP env inheritance exposes API keys

CVE-2026-40159
5.5
EPSS 0.0%
Supply Chain Data Leakage Data Extraction Agent Framework Plugin
PraisonAI Patch: 4.5.128 CWE-200 1 6 ATLAS
CRITICAL EXPLOIT AVAIL

PraisonAI: path traversal allows arbitrary file write via recipe unpack

CVE-2026-40157
--
EPSS 0.1%
Supply Chain Code Execution Agent Framework
PraisonAI Patch: 4.5.128 CWE-22 1 3 ATLAS
HIGH EXPLOIT AVAIL

PraisonAI: auto tools.py load enables local RCE

CVE-2026-40156
7.8
EPSS 0.0%
Supply Chain Code Execution Agent Framework Plugin
praisonai Patch: 4.5.128 CWE-94 1 4 ATLAS
MEDIUM EXPLOIT AVAIL

PraisonAI: decompression bomb causes disk exhaustion

CVE-2026-40148
6.5
EPSS 0.0%
DoS Supply Chain Agent Framework
PraisonAI Patch: 4.5.128 CWE-409 1 4 ATLAS
CRITICAL EXPLOIT AVAIL

PraisonAI: supply chain RCE via unverified template exec

CVE-2026-40154
9.3
EPSS 0.0%
Supply Chain Code Execution Agent Plugin Framework
PraisonAI Patch: 4.5.128 CWE-829 1 7 ATLAS
HIGH EXPLOIT AVAIL

PraisonAI: AST sandbox bypass enables host RCE

CVE-2026-40158
8.6
EPSS 0.0%
Code Execution Data Extraction Agent Framework
PraisonAI Patch: 4.5.128 CWE-94 1 5 ATLAS
MEDIUM EXPLOIT AVAIL

praisonaiagents: glob traversal leaks filesystem metadata

CVE-2026-40152
5.3
EPSS 0.0%
Data Extraction Privacy Violation Agent Plugin
praisonaiagents Patch: 1.5.128 CWE-22 11 5 ATLAS
HIGH EXPLOIT AVAIL

praisonaiagents: env var expansion exposes production secrets

CVE-2026-40153
7.4
EPSS 0.0%
Data Extraction Prompt Injection Data Leakage Agent Plugin
praisonaiagents Patch: 1.5.128 CWE-526 11 5 ATLAS
MEDIUM EXPLOIT AVAIL

PraisonAI: unauthenticated agent config and system prompt disclosure

CVE-2026-40151
5.3
EPSS 0.0%
Data Extraction Auth Bypass Agent API
PraisonAI Patch: 4.5.128 CWE-200 1 6 ATLAS

Need deeper analysis?

Get ATLAS technique mappings, compliance reports (ISO 42001, EU AI Act), breaking alerts, and full CISO analysis with a Pro subscription.

Start 14-Day Free Trial