AI Security Threat Feed

Latest CVEs affecting AI/ML systems, updated continuously. Tracked from NVD, GitHub Advisory, and CISA KEV.

1,604

AI/ML CVEs Tracked

225

Critical

76

New This Week

16

In CISA KEV

Latest AI Security Threats

Showing 20 of 220 results — Medium severity, has patch
MEDIUM

picklescan: RCE bypass enables ML supply chain attack

GHSA-8r4j-24qv-fmq9
--
Supply Chain Code Execution Framework Model
picklescan Patch: 0.0.29 3 6 ATLAS
MEDIUM

picklescan: security bypass enables RCE in ML pipelines

GHSA-cj3c-v495-4xqh
--
Supply Chain Code Execution Model Framework
picklescan Patch: 0.0.29 3 6 ATLAS
MEDIUM

picklescan: detection bypass allows malicious pickle RCE

GHSA-7cq8-mj8x-j263
--
Supply Chain Code Execution Model Framework
picklescan Patch: 0.0.29 3 6 ATLAS
MEDIUM

picklescan: detection bypass allows RCE via ML model files

GHSA-6w4w-5w54-rjvr
--
Supply Chain Code Execution Model Framework
picklescan Patch: 0.0.29 3 6 ATLAS
MEDIUM

picklescan: RCE bypass via idlelib SetText evasion

GHSA-3vg9-h568-4w9m
--
Supply Chain Code Execution Model Framework
picklescan Patch: 0.0.29 3 6 ATLAS
MEDIUM

picklescan: scanner bypass enables RCE in ML models

GHSA-f54q-57x4-jg88
--
Supply Chain Code Execution Framework Model
picklescan Patch: 0.0.29 3 7 ATLAS
MEDIUM

picklescan: scanner bypass enables RCE via ML models

GHSA-6vqj-c2q5-j97w
--
Supply Chain Code Execution Model Framework
picklescan Patch: 0.0.29 3 5 ATLAS
MEDIUM

picklescan: scan bypass allows RCE in ML pipelines

GHSA-x696-vm39-cp64
--
Supply Chain Code Execution Framework Model
picklescan Patch: 0.0.29 3 5 ATLAS
MEDIUM

picklescan: scanner bypass enables RCE in ML pipelines

GHSA-g344-hcph-8vgg
--
Supply Chain Code Execution Model Framework
picklescan Patch: 0.0.29 3 5 ATLAS
MEDIUM

picklescan: bypass enables undetected RCE in ML models

GHSA-5qwp-399c-mjwf
--
Supply Chain Code Execution Model Framework
picklescan Patch: 0.0.29 3 6 ATLAS
MEDIUM

picklescan: PyTorch gadget bypasses scanner, enables RCE

GHSA-vv6j-3g6g-2pvj
--
Supply Chain Code Execution Framework Model
picklescan Patch: 0.0.28 CWE-345 3 6 ATLAS
MEDIUM

picklescan: PyTorch gadget bypasses pickle RCE detection

GHSA-vr7h-p6mm-wpmh
--
Supply Chain Code Execution Framework Model
picklescan Patch: 0.0.28 CWE-345 3 5 ATLAS
MEDIUM

picklescan: detection bypass via PyTorch proxy RCE

GHSA-h3qp-7fh3-f8h4
--
Supply Chain Code Execution Framework Model
picklescan Patch: 0.0.28 3 7 ATLAS
MEDIUM

picklescan: RCE bypass via torch.utils.collect_env

GHSA-f745-w6jp-hpxx
--
Supply Chain Code Execution Framework Model
picklescan Patch: 0.0.28 CWE-345 3 5 ATLAS
MEDIUM

picklescan: scanner bypass enables RCE via PyTorch function

GHSA-f4x7-rfwp-v3xw
--
Supply Chain Code Execution Framework Model
picklescan Patch: 0.0.28 CWE-345 3 5 ATLAS
MEDIUM

picklescan: detection bypass enables PyTorch model RCE

GHSA-86cj-95qr-2p4f
--
Supply Chain Code Execution Framework Model
picklescan Patch: 0.0.28 CWE-345 3 6 ATLAS
MEDIUM

picklescan: PyTorch bypass allows undetected RCE

GHSA-4r9r-ch6f-vxmx
--
Supply Chain Code Execution Framework Model
picklescan Patch: 0.0.28 CWE-345 3 5 ATLAS
MEDIUM EXPLOIT AVAIL

llama-index: DocugamiReader MD5 hash collision drops chunks

CVE-2025-6211
6.5
EPSS 0.3%
Supply Chain Data Leakage Framework RAG
llama-index-readers-docugami Patch: 0.3.1 CWE-440 229 4 ATLAS
MEDIUM EXPLOIT AVAIL

llama-index: JSONReader DoS via recursive JSON parsing

CVE-2025-5472
6.5
EPSS 0.2%
DoS Framework
llama-index-core Patch: 0.12.38 CWE-674 1.1K 3 ATLAS
MEDIUM EXPLOIT AVAIL

llama-index Obsidian reader: hardlink path traversal leaks files

CVE-2025-6210
6.2
EPSS 0.1%
Data Extraction Supply Chain Framework RAG
llama-index-readers-obsidian Patch: 0.5.2 CWE-22 229 3 ATLAS

Need deeper analysis?

Get ATLAS technique mappings, compliance reports (ISO 42001, EU AI Act), breaking alerts, and full CISO analysis with a Pro subscription.

Start 14-Day Free Trial