AI Security Threat Feed

Latest CVEs affecting AI/ML systems, updated continuously. Tracked from NVD, GitHub Advisory, and CISA KEV.

1,604

AI/ML CVEs Tracked

225

Critical

79

New This Week

16

In CISA KEV

Latest AI Security Threats

Showing 20 of 37 results — Medium severity, Active exploitation, has patch
MEDIUM EXPLOIT AVAIL

A vulnerability was found in vllm up to 0.19.0. The affected element is the function has_mamba_layers of the file vllm/v1/kv_cache_interface.py of the...

CVE-2026-7141
5.6
EPSS 0.1%
vllm Patch: 0.19.1 CWE-908 126
MEDIUM EXPLOIT AVAIL

A security vulnerability has been detected in langflow-ai langflow up to 1.8.3. The affected element is the function create_project/encrypt_auth_settings of...

CVE-2026-6598
4.3
EPSS 0.0%
langflow Patch: 1.9.1 CWE-312
MEDIUM EXPLOIT AVAIL

langsmith: prototype pollution enables auth bypass, RCE

CVE-2026-40190
5.6
EPSS 0.1%
Supply Chain Auth Bypass Code Execution Framework Agent Plugin
langsmith Patch: 0.5.18 CWE-1321 2.6K 4 ATLAS
MEDIUM EXPLOIT AVAIL

rembg: path traversal exposes arbitrary files via HTTP API

CVE-2026-40086
5.3
EPSS 0.1%
Data Extraction Privacy Violation Inference API
rembg Patch: 2.0.75 CWE-22 1.1K 4 ATLAS
MEDIUM EXPLOIT AVAIL

PraisonAI: MCP env inheritance exposes API keys

CVE-2026-40159
5.5
EPSS 0.0%
Supply Chain Data Leakage Data Extraction Agent Framework Plugin
PraisonAI Patch: 4.5.128 CWE-200 1 6 ATLAS
MEDIUM EXPLOIT AVAIL

PraisonAI: decompression bomb causes disk exhaustion

CVE-2026-40148
6.5
EPSS 0.0%
DoS Supply Chain Agent Framework
PraisonAI Patch: 4.5.128 CWE-409 1 4 ATLAS
MEDIUM EXPLOIT AVAIL

praisonaiagents: glob traversal leaks filesystem metadata

CVE-2026-40152
5.3
EPSS 0.0%
Data Extraction Privacy Violation Agent Plugin
praisonaiagents Patch: 1.5.128 CWE-22 11 5 ATLAS
MEDIUM EXPLOIT AVAIL

PraisonAI: unauthenticated agent config and system prompt disclosure

CVE-2026-40151
5.3
EPSS 0.0%
Data Extraction Auth Bypass Agent API
PraisonAI Patch: 4.5.128 CWE-200 1 6 ATLAS
MEDIUM EXPLOIT AVAIL

PraisonAI: unbounded body read enables local DoS

CVE-2026-40115
6.2
EPSS 0.1%
DoS Auth Bypass Agent Framework
PraisonAI Patch: 4.5.128 CWE-770 1 3 ATLAS
MEDIUM EXPLOIT AVAIL

OpenClaw: SSRF via web-fetch enables internal network pivot

CVE-2026-6011
5.6
EPSS 0.1%
Data Extraction Privacy Violation Agent Plugin
openclaw Patch: 2026.1.29 CWE-918 4 4 ATLAS 1 incident
MEDIUM EXPLOIT AVAIL

PraisonAI: arbitrary file read via unguarded skill tool

CVE-2026-40117
6.2
EPSS 0.0%
Prompt Injection Data Extraction Data Leakage Agent Plugin
praisonaiagents Patch: 1.5.128 CWE-862 11 5 ATLAS
MEDIUM EXPLOIT AVAIL

LobeChat: auth bypass via forged XOR obfuscated header

CVE-2026-39411
5.0
EPSS 0.0%
Auth Bypass Data Extraction DoS API Inference
@lobehub/lobehub Patch: 2.1.48 CWE-287 3.5K 5 ATLAS
MEDIUM EXPLOIT AVAIL

MLflow: stored XSS via MLmodel YAML artifact upload

CVE-2026-33865
--
EPSS 0.0%
Code Execution Auth Bypass Data Extraction Framework Model
mlflow Patch: 3.11.1 CWE-79 624 4 ATLAS
MEDIUM EXPLOIT AVAIL

HuggingFace Transformers: RCE via malicious checkpoint load

CVE-2026-1839
6.5
EPSS 0.0%
Code Execution Supply Chain Framework Training Data
transformers Patch: 5.0.0rc3 CWE-502 7.8K 3 ATLAS
MEDIUM EXPLOIT AVAIL

ONNX: symlink traversal reads host files via model loading

CVE-2026-34447
5.5
EPSS 0.0%
Supply Chain Data Extraction Framework Model
onnx Patch: 1.21.0 CWE-22 1.1K 5 ATLAS
MEDIUM EXPLOIT AVAIL

open-webui: missing authz allows cross-KB file deletion

CVE-2026-29070
5.4
EPSS 0.0%
Auth Bypass DoS RAG Framework
open-webui Patch: 0.8.6 CWE-862 4 ATLAS
MEDIUM EXPLOIT AVAIL

Open WebUI: path traversal leaks server filesystem path

CVE-2026-28786
4.3
EPSS 0.0%
Data Extraction Data Leakage Framework API
open-webui Patch: 0.8.6 CWE-22 4 ATLAS
MEDIUM EXPLOIT AVAIL

ray: Missing Auth allows unauthenticated access

CVE-2026-27482
5.9
EPSS 0.1%
Auth Bypass DoS Framework Inference
ray Patch: 2.54.0 CWE-306 845 4 ATLAS
MEDIUM EXPLOIT AVAIL

llama-index-core: DoS causes service disruption

CVE-2025-6208
5.3
EPSS 0.0%
DoS Framework RAG
llama-index-core Patch: 0.12.41 CWE-400 1.1K 4 ATLAS
MEDIUM EXPLOIT AVAIL

monai: Path Traversal enables file access

CVE-2026-21851
5.3
EPSS 0.0%
Supply Chain Code Execution Framework
monai Patch: 1.5.2 CWE-22 105 4 ATLAS

Need deeper analysis?

Get ATLAS technique mappings, compliance reports (ISO 42001, EU AI Act), breaking alerts, and full CISO analysis with a Pro subscription.

Start 14-Day Free Trial