AI Security Threat Feed

Latest CVEs affecting AI/ML systems, updated continuously. Tracked from NVD, GitHub Advisory, and CISA KEV.

1,604

AI/ML CVEs Tracked

225

Critical

78

New This Week

16

In CISA KEV

Latest AI Security Threats

Showing 20 of 485 results — High severity, no patch
HIGH

mcp-ssh: argument injection enables LLM-driven local RCE

GHSA-p4h8-56qp-hpgv
--
Code Execution Prompt Injection Data Extraction Agent Plugin
CWE-78 6 ATLAS
HIGH EXPLOIT AVAIL

LiteLLM: RCE via bytecode rewriting in guardrails API

CVE-2026-40217
8.8
EPSS 0.2%
Code Execution Data Extraction Inference Framework API
litellm CWE-420 4 4 ATLAS
HIGH EXPLOIT AVAIL

PraisonAI: unauth WebSocket drains OpenAI API credits

CVE-2026-40116
7.5
EPSS 0.1%
Auth Bypass DoS Agent API
praisonai CWE-770 1 5 ATLAS
HIGH EXPLOIT AVAIL

PraisonAI: arg injection injects env vars into Cloud Run

CVE-2026-40113
8.4
EPSS 0.0%
Code Execution Supply Chain Auth Bypass Agent Framework
praisonai CWE-88 1 4 ATLAS
HIGH

n8n-MCP: SSRF exposes cloud metadata via MCP headers

CVE-2026-39974
8.5
EPSS 0.0%
Data Extraction Data Leakage Agent Plugin
CWE-918 5 ATLAS
HIGH

Langflow: deserialization RCE via FAISS component default

CVE-2026-3357
8.8
EPSS 0.4%
Code Execution Supply Chain Framework RAG
langflow CWE-502 4 ATLAS
HIGH EXPLOIT AVAIL

text-generation-webui: unauthenticated path traversal file read

CVE-2026-35485
7.5
EPSS 0.4%
Data Extraction Auth Bypass Inference Framework
gradio CWE-22 674 3 ATLAS
HIGH EXPLOIT AVAIL

Claude Code CLI: shell injection enables RCE

CVE-2026-35021
7.8
EPSS 0.0%
Code Execution Supply Chain Agent Framework
CWE-78 5 ATLAS
HIGH EXPLOIT AVAIL

Claude Code CLI: OS command injection via TERMINAL env

CVE-2026-35020
8.4
EPSS 0.1%
Code Execution Supply Chain Agent API
claude-code CWE-78 5 ATLAS
HIGH EXPLOIT AVAIL

mobile-mcp: intent injection enables device control via AI agent

CVE-2026-35394
8.3
EPSS 0.0%
Prompt Injection Code Execution Privacy Violation Agent Plugin
CWE-939 6 ATLAS
HIGH

oauthenticator: auth bypass enables JupyterHub account takeover

CVE-2026-33175
8.8
EPSS 0.1%
Auth Bypass Framework
CWE-287 4 ATLAS
HIGH

Ajenti: missing authz lets any user install packages

CVE-2026-35175
--
EPSS 0.0%
Auth Bypass Supply Chain Code Execution Framework Plugin
CWE-862 4 ATLAS
HIGH EXPLOIT AVAIL

awesome-llm-apps MCP Agent: cross-session credential theft

CVE-2026-29872
8.2
EPSS 0.1%
Data Leakage Auth Bypass Privacy Violation Agent API Plugin
7 ATLAS
HIGH EXPLOIT AVAIL

@mobilenext/mobile-mcp: path traversal via AI agent tool

CVE-2026-33989
8.1
EPSS 0.0%
Prompt Injection Code Execution Supply Chain Agent Plugin
CWE-22 6 ATLAS
HIGH EXPLOIT AVAIL

MLflow: broken access control exposes experiment traces

CVE-2025-15381
8.1
EPSS 0.0%
Auth Bypass Data Extraction Data Leakage Framework Training Data
mlflow CWE-200 624 5 ATLAS
HIGH EXPLOIT AVAIL

langflow: Access Control bypass enables privilege escalation

CVE-2026-33484
7.5
EPSS 0.0%
Auth Bypass Data Extraction Privacy Violation Framework API
langflow CWE-284 5 ATLAS
HIGH

langflow: IDOR enables unauthorized data access

CVE-2026-33053
8.8
EPSS 0.0%
Supply Chain Code Execution DoS Framework Agent API
langflow CWE-639 5 ATLAS
HIGH EXPLOIT AVAIL

nltk: Path Traversal enables file access

CVE-2026-33236
8.1
EPSS 0.0%
Supply Chain Code Execution Framework
CWE-22 3 ATLAS
HIGH EXPLOIT AVAIL

deepdiff: DoS causes service disruption

CVE-2026-33155
--
EPSS 0.1%
DoS Supply Chain Framework
CWE-400 4 ATLAS
HIGH EXPLOIT AVAIL

Flowise: header spoof auth bypass exposes admin API & creds

CVE-2026-30820
8.8
EPSS 0.1%
Auth Bypass Data Extraction Code Execution Agent Framework API
flowise CWE-863 5 ATLAS

Need deeper analysis?

Get ATLAS technique mappings, compliance reports (ISO 42001, EU AI Act), breaking alerts, and full CISO analysis with a Pro subscription.

Start 14-Day Free Trial