AI Security Threat Feed

Latest CVEs affecting AI/ML systems, updated continuously. Tracked from NVD, GitHub Advisory, and CISA KEV.

1,625

AI/ML CVEs Tracked

226

Critical

87

New This Week

16

In CISA KEV

Latest AI Security Threats

Showing 20 of 1625 results
HIGH

Flowise: Mass Assignment allows cross-tenant org takeover

GHSA-48m6-ch88-55mj
8.1
Auth Bypass Data Extraction Privacy Violation Agent Framework API
flowise Patch: 3.1.0 CWE-20 5 ATLAS
CRITICAL

Flowise CSVAgent: RCE via Python code injection

GHSA-9wc7-mj3f-74xv
--
Code Execution Auth Bypass Agent Framework
flowise-components Patch: 3.1.0 CWE-94 5 ATLAS
HIGH

Flowise: prompt injection RCE via AirtableAgent

GHSA-f228-chmx-v6j6
8.3
Prompt Injection Code Execution Data Extraction Agent Framework Plugin
flowise-components Patch: 3.1.0 CWE-94 6 ATLAS
MEDIUM

Flowise: SSRF bypass enables cloud metadata access

GHSA-9hrv-gvrv-6gf2
--
Data Extraction Auth Bypass Privacy Violation Agent Framework
flowise-components Patch: 3.1.0 CWE-918 4 ATLAS
MEDIUM

Flowise: SSRF bypass enables cloud credential theft

GHSA-qqvm-66q4-vf5c
--
Data Extraction Auth Bypass Agent Framework Plugin
flowise-components Patch: 3.1.0 CWE-918 5 ATLAS
MEDIUM

Flowise: path traversal allows arbitrary file write via vector store

GHSA-w6v6-49gh-mc9w
--
Code Execution Auth Bypass Framework Agent RAG
flowise-components Patch: 3.1.0 CWE-22 4 ATLAS
MEDIUM

Flowise: hardcoded default key enables JWT token forgery

GHSA-m7mq-85xj-9x33
5.6
Auth Bypass Data Extraction Agent API
flowise Patch: 3.1.0 CWE-798 4 ATLAS
MEDIUM

Flowise: hardcoded session secret enables auth bypass

GHSA-2qqc-p94c-hxwh
5.6
Auth Bypass Data Extraction Agent Framework
flowise Patch: 3.1.0 CWE-798 5 ATLAS
MEDIUM

Flowise: hardcoded JWT defaults enable full auth bypass

GHSA-cc4f-hjpj-g9p8
5.6
Auth Bypass Data Extraction Agent Framework
flowise Patch: 3.1.0 CWE-327 5 ATLAS
MEDIUM

Flowise: unauthenticated SSO config exposes OAuth secrets

GHSA-6pcv-j4jx-m4vx
5.3
Auth Bypass Data Extraction Agent API
flowise Patch: 3.1.0 CWE-306 5 ATLAS
LOW

openclaw: TOCTOU race bypasses exec script preflight

GHSA-gj9q-8w99-mp8j
--
Auth Bypass Data Extraction Agent Plugin
openclaw Patch: 2026.4.10 CWE-367 4 4 ATLAS 1 incident
CRITICAL EXPLOIT AVAIL

Flowise: RCE via MCP stdio command injection

CVE-2026-40933
9.9
EPSS 0.0%
Code Execution Supply Chain Auth Bypass Agent Plugin Framework
flowise-components Patch: 3.1.0 CWE-78 7 ATLAS
HIGH

LangChain-ChatChat: RCE via unauthenticated MCP interface

CVE-2026-30617
8.6
EPSS 0.2%
Code Execution Auth Bypass Supply Chain Agent Framework Plugin
6 ATLAS
CRITICAL EXPLOIT AVAIL

OpenAI Codex CLI: RCE via malicious MCP config files

CVE-2025-61260
9.8
EPSS 0.1%
Code Execution Supply Chain Agent Plugin
@openai/codex CWE-94 3.7K 5 ATLAS
HIGH

mcp-ssh: argument injection enables LLM-driven local RCE

GHSA-p4h8-56qp-hpgv
--
Code Execution Prompt Injection Data Extraction Agent Plugin
CWE-78 6 ATLAS
HIGH EXPLOIT AVAIL

Keras: safe_mode bypass allows RCE via model deserialization

CVE-2026-1462
8.8
EPSS 0.1%
Supply Chain Code Execution Framework Model
keras Patch: 3.13.2 CWE-502 1.5K 4 ATLAS
HIGH

n8n-mcp: unauthenticated HTTP endpoints enable DoS + recon

GHSA-75hx-xj24-mqrw
8.2
Auth Bypass DoS Data Leakage Agent Plugin
n8n-mcp Patch: 2.47.6 CWE-306 16 5 ATLAS
MEDIUM EXPLOIT AVAIL

langsmith: prototype pollution enables auth bypass, RCE

CVE-2026-40190
5.6
EPSS 0.1%
Supply Chain Auth Bypass Code Execution Framework Agent Plugin
langsmith Patch: 0.5.18 CWE-1321 2.6K 4 ATLAS
MEDIUM EXPLOIT AVAIL

rembg: path traversal exposes arbitrary files via HTTP API

CVE-2026-40086
5.3
EPSS 0.1%
Data Extraction Privacy Violation Inference API
rembg Patch: 2.0.75 CWE-22 1.2K 4 ATLAS
CRITICAL

PraisonAI: auth bypass enables browser session hijack

GHSA-8x8f-54wf-vv92
9.1
Auth Bypass Data Extraction Code Execution Agent Plugin
PraisonAI Patch: 4.5.139 CWE-306 1 5 ATLAS

Need deeper analysis?

Get ATLAS technique mappings, compliance reports (ISO 42001, EU AI Act), breaking alerts, and full CISO analysis with a Pro subscription.

Start 14-Day Free Trial