AI Security Threat Feed

Latest CVEs affecting AI/ML systems, updated continuously. Tracked from NVD, GitHub Advisory, and CISA KEV.

1,604

AI/ML CVEs Tracked

225

Critical

78

New This Week

16

In CISA KEV

Latest AI Security Threats

Showing 20 of 512 results — has patch
HIGH EXPLOIT AVAIL

praisonaiagents: SSRF leaks cloud IAM credentials

CVE-2026-34954
8.6
EPSS 0.0%
Prompt Injection Data Extraction Agent Framework
praisonaiagents Patch: 1.5.95 CWE-918 11 5 ATLAS
HIGH EXPLOIT AVAIL

PraisonAI: sandbox escape via shell=True blocklist bypass

CVE-2026-34955
8.8
EPSS 0.0%
Code Execution Prompt Injection Auth Bypass Agent Framework Plugin
praisonai Patch: 4.5.97 CWE-78 1 6 ATLAS 1 incident
HIGH EXPLOIT AVAIL

PraisonAI: SSRF via api_base steals cloud IAM credentials

CVE-2026-34936
7.7
EPSS 0.0%
Data Extraction Auth Bypass Supply Chain Framework API Agent
praisonai Patch: 4.5.90 CWE-918 1 5 ATLAS
HIGH EXPLOIT AVAIL

PraisonAI: OS command injection via run_python() shell escape

CVE-2026-34937
7.8
EPSS 0.0%
Code Execution Prompt Injection Auth Bypass Agent Framework Plugin
praisonaiagents Patch: 1.5.90 CWE-78 11 6 ATLAS 1 incident
CRITICAL EXPLOIT AVAIL

praisonaiagents: sandbox bypass enables full host RCE

CVE-2026-34938
10.0
EPSS 0.0%
Code Execution Prompt Injection Supply Chain Agent Framework Plugin
praisonaiagents Patch: 1.5.90 CWE-693 11 7 ATLAS
HIGH EXPLOIT AVAIL

Open WebUI: access control bypass leaks Tool Valve API keys

CVE-2026-34222
7.7
EPSS 0.0%
Auth Bypass Data Extraction Agent Plugin Framework
open-webui Patch: 0.8.11 CWE-285 5 ATLAS
MEDIUM EXPLOIT AVAIL

ONNX: symlink traversal reads host files via model loading

CVE-2026-34447
5.5
EPSS 0.0%
Supply Chain Data Extraction Framework Model
onnx Patch: 1.21.0 CWE-22 1.1K 5 ATLAS
MEDIUM

ONNX: hardlink path traversal leaks sensitive files

CVE-2026-34446
4.7
EPSS 0.0%
Supply Chain Data Extraction Framework Model
onnx Patch: 1.21.0 CWE-22 1.1K 4 ATLAS
HIGH

ONNX: property overwrite via crafted model file

CVE-2026-34445
8.6
EPSS 0.2%
Supply Chain DoS Code Execution Framework Model Inference
onnx Patch: 1.21.0 CWE-20 1.1K 5 ATLAS
UNKNOWN EXPLOIT AVAIL

ONNX: symlink path traversal allows arbitrary file read

CVE-2026-27489
--
EPSS 0.1%
Supply Chain Data Extraction Framework Model
onnx Patch: 1.21.0 CWE-23 1.1K 5 ATLAS
MEDIUM

Anthropic SDK: TOCTOU symlink escape in async memory tool

CVE-2026-34452
--
EPSS 0.0%
Code Execution Data Extraction Auth Bypass Framework Agent API
anthropic Patch: 0.87.0 CWE-59 4.7K 5 ATLAS 17 incidents
MEDIUM

anthropic-ai/sdk: memory tool path traversal escape

CVE-2026-34451
--
EPSS 0.1%
Prompt Injection Data Extraction Code Execution Framework Agent API
@anthropic-ai/sdk Patch: 0.81.0 CWE-22 263 6 ATLAS
MEDIUM

anthropic-sdk: insecure file perms expose agent memory

CVE-2026-34450
--
EPSS 0.0%
Data Leakage Model Poisoning Data Extraction Agent Framework API
anthropic Patch: 0.87.0 CWE-276 4.7K 4 ATLAS 17 incidents
HIGH

OpenClaw: .npmrc hijack enables RCE on plugin install

GHSA-m3mh-3mpg-37hw
8.6
Code Execution Supply Chain Framework Plugin Agent
openclaw Patch: 2026.3.24 CWE-426 4 4 ATLAS 3 incidents
MEDIUM

OpenClaw: HTTP scope bypass enables model enumeration

GHSA-68f8-9mhj-h2mp
--
Auth Bypass Data Extraction API Inference
openclaw Patch: 2026.3.24 CWE-284 4 4 ATLAS 2 incidents
HIGH

OpenClaw: sandbox escape via mediaUrl path traversal

GHSA-hr5v-j9h9-xjhg
7.7
Data Extraction Auth Bypass Agent Plugin Framework
openclaw Patch: 2026.3.24 CWE-22 4 5 ATLAS 2 incidents
CRITICAL EXPLOIT AVAIL

MLflow: RCE via unsanitized model dependency specs

CVE-2025-15379
10.0
EPSS 0.2%
Code Execution Supply Chain Framework
mlflow Patch: 3.8.1 CWE-77 624 4 ATLAS 1 incident
CRITICAL EXPLOIT AVAIL

MLflow: path traversal enables sandbox escape, file overwrite

CVE-2025-15036
9.6
EPSS 0.0%
Supply Chain Code Execution Framework
mlflow Patch: 3.9.0rc0 CWE-29 624 5 ATLAS
MEDIUM

openclaw: webhook rate-limit bypass enables token brute-force

CVE-2026-35646
--
EPSS 0.1%
Auth Bypass Data Extraction Agent Plugin
openclaw Patch: 2026.3.28 CWE-307 4 4 ATLAS 1 incident
MEDIUM

openclaw: unauthenticated webhook parsing enables DoS

CVE-2026-35640
--
EPSS 0.1%
DoS Agent
openclaw Patch: 2026.3.28 CWE-400 4 3 ATLAS

Need deeper analysis?

Get ATLAS technique mappings, compliance reports (ISO 42001, EU AI Act), breaking alerts, and full CISO analysis with a Pro subscription.

Start 14-Day Free Trial