AI Security Threat Feed

Latest CVEs affecting AI/ML systems, updated continuously. Tracked from NVD, GitHub Advisory, and CISA KEV.

1,604

AI/ML CVEs Tracked

225

Critical

79

New This Week

16

In CISA KEV

Latest AI Security Threats

Showing 20 of 267 results — Medium severity, Active exploitation
MEDIUM EXPLOIT AVAIL

A vulnerability was found in vllm up to 0.19.0. The affected element is the function has_mamba_layers of the file vllm/v1/kv_cache_interface.py of the...

CVE-2026-7141
5.6
EPSS 0.1%
vllm Patch: 0.19.1 CWE-908 126
MEDIUM EXPLOIT AVAIL

A security flaw has been discovered in Ollama up to 0.20.2. This affects the function digestToPath of the file x/imagegen/transfer/transfer.go of the component...

CVE-2026-7020
5.6
EPSS 0.1%
CWE-22
MEDIUM EXPLOIT AVAIL

A vulnerability was detected in lm-sys fastchat up to 0.2.36. Impacted is the function add_text of the component Arena Side-by-Side View Handler. The...

CVE-2026-6608
5.3
EPSS 0.0%
fschat CWE-670 674
MEDIUM EXPLOIT AVAIL

A vulnerability was detected in langflow-ai langflow up to 1.8.3. The impacted element is the function get_client_ip/install_mcp_config of the file...

CVE-2026-6599
6.3
EPSS 0.0%
langflow CWE-74
MEDIUM EXPLOIT AVAIL

A security vulnerability has been detected in langflow-ai langflow up to 1.8.3. The affected element is the function create_project/encrypt_auth_settings of...

CVE-2026-6598
4.3
EPSS 0.0%
langflow Patch: 1.9.1 CWE-312
MEDIUM EXPLOIT AVAIL

langsmith: prototype pollution enables auth bypass, RCE

CVE-2026-40190
5.6
EPSS 0.1%
Supply Chain Auth Bypass Code Execution Framework Agent Plugin
langsmith Patch: 0.5.18 CWE-1321 2.6K 4 ATLAS
MEDIUM EXPLOIT AVAIL

rembg: path traversal exposes arbitrary files via HTTP API

CVE-2026-40086
5.3
EPSS 0.1%
Data Extraction Privacy Violation Inference API
rembg Patch: 2.0.75 CWE-22 1.1K 4 ATLAS
MEDIUM EXPLOIT AVAIL

PraisonAI: MCP env inheritance exposes API keys

CVE-2026-40159
5.5
EPSS 0.0%
Supply Chain Data Leakage Data Extraction Agent Framework Plugin
PraisonAI Patch: 4.5.128 CWE-200 1 6 ATLAS
MEDIUM EXPLOIT AVAIL

PraisonAI: decompression bomb causes disk exhaustion

CVE-2026-40148
6.5
EPSS 0.0%
DoS Supply Chain Agent Framework
PraisonAI Patch: 4.5.128 CWE-409 1 4 ATLAS
MEDIUM EXPLOIT AVAIL

praisonaiagents: glob traversal leaks filesystem metadata

CVE-2026-40152
5.3
EPSS 0.0%
Data Extraction Privacy Violation Agent Plugin
praisonaiagents Patch: 1.5.128 CWE-22 11 5 ATLAS
MEDIUM EXPLOIT AVAIL

PraisonAI: unauthenticated agent config and system prompt disclosure

CVE-2026-40151
5.3
EPSS 0.0%
Data Extraction Auth Bypass Agent API
PraisonAI Patch: 4.5.128 CWE-200 1 6 ATLAS
MEDIUM EXPLOIT AVAIL

PraisonAI: unbounded body read enables local DoS

CVE-2026-40115
6.2
EPSS 0.1%
DoS Auth Bypass Agent Framework
PraisonAI Patch: 4.5.128 CWE-770 1 3 ATLAS
MEDIUM EXPLOIT AVAIL

OpenClaw: SSRF via web-fetch enables internal network pivot

CVE-2026-6011
5.6
EPSS 0.1%
Data Extraction Privacy Violation Agent Plugin
openclaw Patch: 2026.1.29 CWE-918 4 4 ATLAS 1 incident
MEDIUM EXPLOIT AVAIL

PraisonAI: arbitrary file read via unguarded skill tool

CVE-2026-40117
6.2
EPSS 0.0%
Prompt Injection Data Extraction Data Leakage Agent Plugin
praisonaiagents Patch: 1.5.128 CWE-862 11 5 ATLAS
MEDIUM EXPLOIT AVAIL

PraisonAI: XSS via no-op HTML sanitizer in agent output

CVE-2026-40112
5.4
EPSS 0.0%
Prompt Injection Code Execution Data Extraction Agent Framework RAG
praisonai CWE-79 1 4 ATLAS
MEDIUM EXPLOIT AVAIL

openai-realtime-ui: SSRF in API proxy endpoint

CVE-2026-5803
6.3
EPSS 0.0%
Data Extraction Auth Bypass API
CWE-918 3 ATLAS
MEDIUM EXPLOIT AVAIL

LobeChat: auth bypass via forged XOR obfuscated header

CVE-2026-39411
5.0
EPSS 0.0%
Auth Bypass Data Extraction DoS API Inference
@lobehub/lobehub Patch: 2.1.48 CWE-287 3.5K 5 ATLAS
MEDIUM EXPLOIT AVAIL

lollms: sessions persist after password reset

CVE-2026-1163
4.1
EPSS 0.0%
Auth Bypass Data Extraction API Agent
lollms CWE-613 3 ATLAS
MEDIUM EXPLOIT AVAIL

MLflow: auth bypass exposes model artifacts across experiments

CVE-2026-33866
--
EPSS 0.0%
Auth Bypass Data Extraction Framework Model
mlflow CWE-862 624 4 ATLAS
MEDIUM EXPLOIT AVAIL

MLflow: stored XSS via MLmodel YAML artifact upload

CVE-2026-33865
--
EPSS 0.0%
Code Execution Auth Bypass Data Extraction Framework Model
mlflow Patch: 3.11.1 CWE-79 624 4 ATLAS

Need deeper analysis?

Get ATLAS technique mappings, compliance reports (ISO 42001, EU AI Act), breaking alerts, and full CISO analysis with a Pro subscription.

Start 14-Day Free Trial