AI Security Threat Feed

Latest CVEs affecting AI/ML systems, updated continuously. Tracked from NVD, GitHub Advisory, and CISA KEV.

1,625

AI/ML CVEs Tracked

226

Critical

87

New This Week

16

In CISA KEV

Latest AI Security Threats

Showing 20 of 1625 results
HIGH EXPLOIT AVAIL

praisonai: SSTI enables RCE via agent instructions

CVE-2026-39891
8.8
EPSS 0.0%
Code Execution Prompt Injection Data Extraction Agent Framework Plugin
praisonai Patch: 4.5.115 CWE-94 1 5 ATLAS
HIGH

PraisonAI: unauth A2U stream leaks all agent activity

CVE-2026-39889
7.5
EPSS 0.0%
Auth Bypass Data Leakage Data Extraction Agent Framework
praisonai Patch: 4.5.115 CWE-200 1 5 ATLAS
CRITICAL

praisonaiagents: sandbox escape enables host RCE

CVE-2026-39888
10.0
EPSS 0.1%
Code Execution Auth Bypass Agent Framework
praisonaiagents Patch: 1.5.115 CWE-657 11 5 ATLAS
CRITICAL EXPLOIT AVAIL

PraisonAI: YAML deserialization enables unauthenticated RCE

CVE-2026-39890
9.8
EPSS 0.6%
Code Execution Supply Chain Agent Framework
praisonai Patch: 4.5.115 CWE-502 1 5 ATLAS
MEDIUM EXPLOIT AVAIL

LobeChat: auth bypass via forged XOR obfuscated header

CVE-2026-39411
5.0
EPSS 0.0%
Auth Bypass Data Extraction DoS API Inference
@lobehub/lobehub Patch: 2.1.48 CWE-287 3.7K 5 ATLAS
MEDIUM EXPLOIT AVAIL

lollms: sessions persist after password reset

CVE-2026-1163
4.1
EPSS 0.0%
Auth Bypass Data Extraction API Agent
lollms CWE-613 3 ATLAS
HIGH

Langflow: deserialization RCE via FAISS component default

CVE-2026-3357
8.8
EPSS 0.4%
Code Execution Supply Chain Framework RAG
langflow CWE-502 4 ATLAS
MEDIUM

openclaw-claude-bridge: sandbox bypass exposes CLI tools

CVE-2026-39398
--
Code Execution Auth Bypass Prompt Injection Agent Plugin
claude-code CWE-276 4 ATLAS
HIGH

LiteLLM: auth bypass chain enables full privilege escalation

GHSA-69x8-hrgq-fjj8
--
Auth Bypass Data Extraction Privacy Violation API Inference Framework
litellm Patch: 1.83.0 CWE-200 4 5 ATLAS
HIGH

MONAI: pickle deserialization RCE in Auto3DSeg

GHSA-89gg-p5r5-q6r4
7.7
Code Execution Supply Chain Framework Training Data
monai Patch: 1.5.2 CWE-502 105 4 ATLAS
MEDIUM

OpenClaw: cleartext WebSocket exposes gateway credentials

GHSA-83f3-hh45-vfw9
--
Data Leakage Auth Bypass Agent
openclaw Patch: 2026.4.2 CWE-200 4 3 ATLAS 1 incident
MEDIUM

openclaw: timing side-channel leaks shared-secret length

GHSA-jj6q-rrrf-h66h
--
Auth Bypass Data Extraction Agent Framework
openclaw Patch: 2026.4.2 CWE-208 4 3 ATLAS 1 incident
MEDIUM

OpenClaw: Zalo webhook dedup collision silently drops events

GHSA-rxmx-g7hr-8mx4
--
DoS Agent API
openclaw Patch: 2026.4.2 CWE-349 4 2 ATLAS
MEDIUM

OpenClaw: CDP host bypass exposes localhost browser state

GHSA-fh32-73r9-rgh5
--
Auth Bypass Data Extraction Agent Plugin
openclaw Patch: 2026.4.2 CWE-20 4 4 ATLAS 1 incident
MEDIUM

openclaw: script swap bypasses pnpm dlx approval

GHSA-w6wx-jq6j-6mcj
--
Auth Bypass Code Execution Supply Chain Agent Plugin
openclaw Patch: 2026.4.2 CWE-863 4 4 ATLAS 1 incident
MEDIUM

OpenClaw: approval bypass via env key normalization gap

GHSA-98ch-45wp-ch47
--
Auth Bypass Code Execution Agent Framework
openclaw Patch: 2026.4.2 CWE-178 4 4 ATLAS 1 incident
MEDIUM

OpenClaw: info disclosure exposes host filesystem paths

GHSA-2f7j-rp58-mr42
--
Data Leakage Privacy Violation Agent Framework
openclaw Patch: 2026.4.2 CWE-200 4 3 ATLAS
MEDIUM

OpenClaw: untrusted plugin RCE via workspace channel setup

GHSA-2qrv-rc5x-2g2h
--
Supply Chain Code Execution Auth Bypass Agent Plugin
openclaw Patch: 2026.4.2 CWE-829 4 4 ATLAS 1 incident
MEDIUM

OpenClaw: read-only scope bypass kills agent sessions

GHSA-5hff-46vh-rxmw
--
Auth Bypass DoS Agent
openclaw Patch: 2026.4.2 CWE-269 4 3 ATLAS
MEDIUM

openclaw: iOS bridge bypass enables unauthorized agent runs

GHSA-4p4f-fc8q-84m3
--
Auth Bypass DoS Agent
openclaw Patch: 2026.4.2 CWE-284 4 4 ATLAS

Need deeper analysis?

Get ATLAS technique mappings, compliance reports (ISO 42001, EU AI Act), breaking alerts, and full CISO analysis with a Pro subscription.

Start 14-Day Free Trial