AI Security Threat Feed

Latest CVEs affecting AI/ML systems, updated continuously. Tracked from NVD, GitHub Advisory, and CISA KEV.

1,604

AI/ML CVEs Tracked

225

Critical

77

New This Week

16

In CISA KEV

Latest AI Security Threats

Showing 20 of 684 results — High severity
HIGH EXPLOIT AVAIL

PyTorch 2.7.0: DoS via proxy_tensor.py syntax error

CVE-2025-55553
7.5
EPSS 0.1%
DoS Supply Chain Framework Inference
pytorch 21.9K 3 ATLAS
HIGH EXPLOIT AVAIL

PyTorch: integer overflow in rot90+randn_like causes DoS

CVE-2025-55552
7.5
EPSS 0.1%
DoS Supply Chain Framework Inference
pytorch CWE-190 21.9K 3 ATLAS
HIGH EXPLOIT AVAIL

PyTorch: DoS in linalg.lu via malformed slice op

CVE-2025-55551
7.5
EPSS 0.1%
DoS Framework Inference
pytorch 21.9K 4 ATLAS
HIGH EXPLOIT AVAIL

Transformers: ReDoS in optimizer halts training pipelines

CVE-2025-6921
7.5
EPSS 0.0%
DoS Framework Training Data
transformers CWE-400 7.9K 4 ATLAS
HIGH EXPLOIT AVAIL

Flowise: unauthenticated SSRF exposes internal network

CVE-2025-59527
7.5
EPSS 0.1%
Data Extraction Privacy Violation Agent Framework
flowise 4 ATLAS
HIGH EXPLOIT AVAIL

Keras: safe_mode bypass enables RCE via model load

CVE-2025-9906
7.3
EPSS 0.1%
Code Execution Supply Chain Framework Model
keras CWE-502 1.5K 6 ATLAS
HIGH EXPLOIT AVAIL

Keras: safe_mode bypass enables RCE via .h5 model files

CVE-2025-9905
7.3
EPSS 0.0%
Code Execution Supply Chain Framework Model
keras CWE-913 1.5K 5 ATLAS
HIGH EXPLOIT AVAIL

picklescan: file extension bypass allows model RCE

CVE-2025-10155
7.8
EPSS 0.1%
Supply Chain Code Execution Model Framework
picklescan CWE-20 3 5 ATLAS
HIGH EXPLOIT AVAIL

HuggingFace Transformers: ReDoS in MarianTokenizer

CVE-2025-6638
7.5
EPSS 0.0%
DoS Supply Chain Framework Inference
transformers CWE-1333 7.9K 4 ATLAS
HIGH EXPLOIT AVAIL

Picklescan: CRC bypass hides malicious pickle in ZIP

CVE-2025-10156
7.5
EPSS 1.0%
Supply Chain Code Execution Model Framework
picklescan Patch: 0.0.31 CWE-693 3 5 ATLAS 1 incident
HIGH EXPLOIT AVAIL

PickleScan: subclass bypass enables malicious model RCE

CVE-2025-10157
8.3
EPSS 0.2%
Supply Chain Code Execution Model Framework
picklescan Patch: 0.0.31 CWE-693 3 5 ATLAS 1 incident
HIGH EXPLOIT AVAIL

MONAI: unsafe pickle deserialization RCE in data pipeline

CVE-2025-58757
8.8
EPSS 0.8%
Code Execution Supply Chain Framework Training Data
monai Patch: 1.5.1 CWE-502 105 5 ATLAS
HIGH EXPLOIT AVAIL

MONAI: unsafe deserialization in CheckpointLoader allows RCE

CVE-2025-58756
8.8
EPSS 1.7%
Code Execution Supply Chain Framework Training Data
monai Patch: 1.5.1 CWE-502 105 5 ATLAS
HIGH EXPLOIT AVAIL

MONAI: path traversal allows arbitrary file write

CVE-2025-58755
8.8
EPSS 0.1%
Supply Chain Code Execution Framework
monai Patch: 1.5.1 CWE-22 105 4 ATLAS
HIGH EXPLOIT AVAIL

n8n: unrestricted file upload RCE via Chat Trigger

CVE-2025-56265
8.8
EPSS 0.1%
Code Execution Data Extraction Auth Bypass Framework Agent Plugin
n8n 16 5 ATLAS
HIGH EXPLOIT AVAIL SCANNER

EverNoteLoader: XXE exposes host files in LangChain

CVE-2025-6984
7.5
EPSS 1.9%
Data Extraction Data Leakage Framework RAG
langchain-community Patch: 0.3.27 CWE-200 1.2K 4 ATLAS
HIGH EXPLOIT AVAIL

llama-index: JSON parsing DoS via deep recursion

CVE-2025-5302
8.6
EPSS 0.1%
DoS Framework RAG
llama-index-core Patch: 0.12.38 CWE-674 1.1K 3 ATLAS
HIGH EXPLOIT AVAIL

xgrammar: uncontrolled recursion in grammar parsing causes DoS

CVE-2025-57809
7.5
EPSS 0.0%
DoS Supply Chain Framework Inference
xgrammar Patch: 0.1.21 CWE-674 154 3 ATLAS
HIGH EXPLOIT AVAIL

Langflow: privilege escalation to full superuser via CLI

CVE-2025-57760
8.8
EPSS 0.0%
Auth Bypass Code Execution Framework Agent
langflow CWE-269 5 ATLAS
HIGH EXPLOIT AVAIL

vLLM: unauthenticated DoS via oversized HTTP header

CVE-2025-48956
7.5
EPSS 0.3%
DoS Inference API Framework
vllm CWE-400 127 3 ATLAS

Need deeper analysis?

Get ATLAS technique mappings, compliance reports (ISO 42001, EU AI Act), breaking alerts, and full CISO analysis with a Pro subscription.

Start 14-Day Free Trial