AI Security Threat Feed
Latest CVEs affecting AI/ML systems, updated continuously. Tracked from NVD, GitHub Advisory, and CISA KEV.
AI/ML CVEs Tracked
Critical
New This Week
In CISA KEV
Latest AI Security Threats
Showing 20 of 512 results — has patchopen-webui: mass assignment enables cross-user folder injection
CVE-2026-44550 open-webui: LDAP auth bypass — full account takeover
CVE-2026-44551 open-webui: XSS in model descriptions steals session tokens
CVE-2026-44721 n8n-mcp: path traversal + SSRF exposes n8n API keys
GHSA-8g7g-hmwm-6rv2 n8n-MCP: SSRF allows internal network access via webhook tools
CVE-2026-44694 BentoML: symlink traversal exfiltrates host secrets at build
CVE-2026-40610 diffusers: trust_remote_code bypass enables silent RCE
CVE-2026-44513 vm2: sandbox escape via nesting:true enables RCE
CVE-2026-44007 diffusers: silent RCE via None.py trust_remote_code bypass
GHSA-j7w6-vpvq-j3gm Aegra: cross-tenant IDOR hijacks user thread data
CVE-2026-44504 @axonflow/openclaw: credential exposure via insecure file permissions
GHSA-cqmh-pcgr-q42f praisonai: RCE via unpatched tool_override exec_module
CVE-2026-44334 praisonaiagents: SSRF via URL parser confusion bypass
CVE-2026-44335 GitPython: git config injection enables hook RCE
CVE-2026-44244 vLLM: speculative decoding DoS via penalty params
CVE-2026-44223 JupyterLab: one-click RCE via notebook HTML cell output
CVE-2026-42557 mistune: ReDoS exposes Jupyter/AI services to DoS
CVE-2026-33079 vLLM: token injection DoS via multimodal placeholders
CVE-2026-44222 JupyterLab: Extension allow-list bypass enables privesc
CVE-2026-42266 openclaw: Model bypasses authz to persist unsafe config
GHSA-cwj3-vqpp-pmxr Need deeper analysis?
Get ATLAS technique mappings, compliance reports (ISO 42001, EU AI Act), breaking alerts, and full CISO analysis with a Pro subscription.
Start 14-Day Free Trial
AI Threat Alert