AI Security Threat Feed

Latest CVEs affecting AI/ML systems, updated continuously. Tracked from NVD, GitHub Advisory, and CISA KEV.

1,604

AI/ML CVEs Tracked

225

Critical

78

New This Week

16

In CISA KEV

Latest AI Security Threats

Showing 20 of 512 results — has patch
MEDIUM

OpenClaw: CDP host bypass exposes localhost browser state

GHSA-fh32-73r9-rgh5
--
Auth Bypass Data Extraction Agent Plugin
openclaw Patch: 2026.4.2 CWE-20 4 4 ATLAS 1 incident
MEDIUM

openclaw: script swap bypasses pnpm dlx approval

GHSA-w6wx-jq6j-6mcj
--
Auth Bypass Code Execution Supply Chain Agent Plugin
openclaw Patch: 2026.4.2 CWE-863 4 4 ATLAS 1 incident
MEDIUM

OpenClaw: approval bypass via env key normalization gap

GHSA-98ch-45wp-ch47
--
Auth Bypass Code Execution Agent Framework
openclaw Patch: 2026.4.2 CWE-178 4 4 ATLAS 1 incident
MEDIUM

OpenClaw: info disclosure exposes host filesystem paths

GHSA-2f7j-rp58-mr42
--
Data Leakage Privacy Violation Agent Framework
openclaw Patch: 2026.4.2 CWE-200 4 3 ATLAS
MEDIUM

OpenClaw: untrusted plugin RCE via workspace channel setup

GHSA-2qrv-rc5x-2g2h
--
Supply Chain Code Execution Auth Bypass Agent Plugin
openclaw Patch: 2026.4.2 CWE-829 4 4 ATLAS 1 incident
MEDIUM

OpenClaw: read-only scope bypass kills agent sessions

GHSA-5hff-46vh-rxmw
--
Auth Bypass DoS Agent
openclaw Patch: 2026.4.2 CWE-269 4 3 ATLAS
MEDIUM

openclaw: iOS bridge bypass enables unauthorized agent runs

GHSA-4p4f-fc8q-84m3
--
Auth Bypass DoS Agent
openclaw Patch: 2026.4.2 CWE-284 4 4 ATLAS
MEDIUM

OpenClaw: path traversal → host file exfiltration via QQ Bot

GHSA-846p-hgpv-vphc
--
Prompt Injection Data Extraction Agent Plugin
openclaw Patch: 2026.4.2 CWE-22 4 4 ATLAS 1 incident
MEDIUM

openclaw: path traversal enables remote dir overwrite

GHSA-m34q-h93w-vg5x
--
Supply Chain Code Execution Agent Framework
openclaw Patch: 2026.4.2 CWE-22 4 4 ATLAS 1 incident
LOW

OpenClaw: cross-account webhook event suppression

GHSA-fqrj-m88p-qf3v
--
DoS Auth Bypass Agent
openclaw Patch: 2026.3.31 CWE-287 4 3 ATLAS
MEDIUM

OpenClaw: pairing DoS blocks account onboarding

GHSA-wwfp-w96m-c6x8
--
DoS Agent
openclaw Patch: 2026.3.31 4 2 ATLAS 1 incident
MEDIUM

OpenClaw: pre-auth signature bypass enables pairing DoS

GHSA-h43v-27wg-5mf9
--
DoS Auth Bypass Agent Framework
openclaw Patch: 2026.3.31 CWE-347 4 3 ATLAS
MEDIUM

OpenClaw: exec allowlist bypass via shell init-file options

GHSA-wpc6-37g7-8q4w
--
Auth Bypass Code Execution Agent Plugin
openclaw Patch: 2026.3.31 CWE-184 4 4 ATLAS 1 incident
MEDIUM

openclaw: sandbox escape via mirror mode hook execution

GHSA-42mx-vp8m-j7qh
--
Code Execution Supply Chain Agent Framework
openclaw Patch: 2026.3.28 CWE-829 4 4 ATLAS 1 incident
LOW

openclaw: operator.write escalates to admin Telegram config + cron

GHSA-767m-xrhc-fxm7
--
Auth Bypass Data Leakage Agent
openclaw Patch: 2026.3.28 CWE-269 4 4 ATLAS 1 incident
MEDIUM

openclaw: auth bypass exposes agent session visibility

GHSA-fwjq-xwfj-gv75
--
Auth Bypass Data Extraction Agent Framework
openclaw Patch: 2026.3.31 CWE-863 4 4 ATLAS 1 incident
MEDIUM

openclaw: privilege escalation to admin voice config persistence

GHSA-3q42-xmxv-9vfr
--
Auth Bypass Supply Chain Agent Framework
openclaw Patch: 2026.3.28 CWE-269 4 3 ATLAS 1 incident
HIGH

openclaw: env var injection via workspace config

GHSA-vfw7-6rhc-6xxg
--
Supply Chain Code Execution Data Extraction Agent Framework Plugin
openclaw Patch: 2026.3.24 CWE-426 4 4 ATLAS 1 incident
MEDIUM

openclaw: SSRF in marketplace plugin download

GHSA-vjx8-8p7h-82gr
--
Supply Chain Data Extraction Auth Bypass Agent Plugin
openclaw Patch: 2026.3.31 CWE-918 4 4 ATLAS 1 incident
MEDIUM

openclaw: media download bypass exhausts disk storage

GHSA-4g5x-2jfc-xm98
--
DoS Agent Plugin
openclaw Patch: 2026.3.31 CWE-434 4 3 ATLAS

Need deeper analysis?

Get ATLAS technique mappings, compliance reports (ISO 42001, EU AI Act), breaking alerts, and full CISO analysis with a Pro subscription.

Start 14-Day Free Trial