AI Security Threat Feed

Latest CVEs affecting AI/ML systems, updated continuously. Tracked from NVD, GitHub Advisory, and CISA KEV.

1,604

AI/ML CVEs Tracked

225

Critical

77

New This Week

16

In CISA KEV

Latest AI Security Threats

Showing 20 of 199 results — High severity, has patch
HIGH

JupyterLab: Extension allow-list bypass enables privesc

CVE-2026-42266
8.8
Supply Chain Auth Bypass Code Execution Framework Plugin
jupyterlab Patch: 4.5.7 CWE-20 1.9K 4 ATLAS
HIGH

openclaw: Model bypasses authz to persist unsafe config

GHSA-cwj3-vqpp-pmxr
8.8
Prompt Injection Auth Bypass Code Execution Agent Plugin Framework
openclaw Patch: 2026.4.23 CWE-862 4 5 ATLAS 1 incident
HIGH

OpenClaw: RCE via malicious repo setup-api.js

GHSA-r39h-4c2p-3jxp
7.8
Supply Chain Code Execution Agent Plugin
openclaw Patch: 2026.4.23 CWE-94 4 4 ATLAS 1 incident
HIGH

Jupyter Server: CORS bypass via regex anchor omission

CVE-2026-40110
--
EPSS 0.0%
Auth Bypass Code Execution Data Extraction Framework API
jupyter-server Patch: 2.18.0 CWE-777 1.9K 4 ATLAS
HIGH

Jupyter Server: path traversal leaks sibling directories

CVE-2026-35397
7.1
EPSS 0.0%
Data Extraction Privacy Violation Framework
jupyter-server Patch: 2.18.0 CWE-22 1.9K 4 ATLAS
HIGH

openclaw: TOCTOU sandbox escape via symlink swap

GHSA-wppj-c6mr-83jj
--
Code Execution Supply Chain Auth Bypass Agent Plugin
openclaw Patch: 2026.4.22 CWE-367 4 4 ATLAS 1 incident
HIGH

openclaw: MCP owner-context spoofing, privilege escalation

GHSA-r6xh-pqhr-v4xh
--
Auth Bypass Code Execution Agent Framework
openclaw Patch: 2026.4.22 CWE-284 4 4 ATLAS 1 incident
HIGH

n8n-mcp: SSRF bypass via IPv6 leaks API keys

CVE-2026-42449
8.5
EPSS 0.0%
Data Extraction Auth Bypass Supply Chain Agent Plugin
n8n-mcp Patch: 2.47.14 CWE-918 16 5 ATLAS
HIGH

Jupyter Notebook: stored XSS enables full account takeover

CVE-2026-40171
--
EPSS 0.1%
Auth Bypass Code Execution Data Extraction Framework Training Data
@jupyterlab/help-extension Patch: 4.5.7 CWE-79 1.9K 7 ATLAS
HIGH EXPLOIT AVAIL

marked: infinite recursion DoS crashes Node.js via OOM

CVE-2026-41680
7.5
EPSS 0.1%
DoS Framework
marked Patch: 18.0.2 CWE-400 3.8K 4 ATLAS
HIGH

litellm: RCE via MCP test endpoints privilege bypass

GHSA-v4p8-mg3p-g94g
--
Auth Bypass Code Execution API Inference
litellm Patch: 1.83.7 CWE-78 4 5 ATLAS
HIGH

Claude Code: git worktree trust bypass executes hooks

CVE-2026-40068
--
EPSS 0.1%
Auth Bypass Code Execution Supply Chain Agent Framework Plugin
@anthropic-ai/claude-code Patch: 2.1.84 CWE-20 5 ATLAS
HIGH

Ray: Parquet RCE via Arrow extension deserialization

CVE-2026-41486
--
EPSS 0.1%
Code Execution Supply Chain Framework Training Data
ray Patch: 2.55.0 CWE-94 847 5 ATLAS
HIGH

LiteLLM: RCE via unsandboxed prompt template rendering

GHSA-xqmj-j6mv-4862
--
Code Execution Data Extraction Inference API
litellm Patch: 1.83.7 CWE-1336 4 5 ATLAS
HIGH

Claude Code: sandbox escape via symlink allows arbitrary write

CVE-2026-39861
--
EPSS 0.2%
Code Execution Prompt Injection Auth Bypass Agent
@anthropic-ai/claude-code Patch: 2.1.64 CWE-22 5 ATLAS
HIGH EXPLOIT AVAIL

A security flaw has been discovered in langflow-ai langflow up to 1.1.0. This issue affects the function create_upload_file of the file...

CVE-2026-6596
7.3
EPSS 0.1%
langflow-base Patch: 1.9.1 CWE-284
HIGH

OpenClaw: Webchat media embedding enforces local-root containment for tool-result files

GHSA-mr34-9552-qr95
--
openclaw Patch: 2026.4.15 CWE-22 4
HIGH

OpenClaw: Matrix room control-command authorization no longer trusts DM pairing-store entries

GHSA-2gvc-4f3c-2855
--
openclaw Patch: 2026.4.15 CWE-863 4
HIGH

OpenClaw: Gateway HTTP endpoints re-resolve bearer auth after SecretRef rotation

GHSA-xmxx-7p24-h892
--
openclaw Patch: 2026.4.15 CWE-324 4
HIGH

PraisonAI: SQL Injection via unvalidated `table_prefix` in 9 conversation store backends (incomplete fix for CVE-2026-40315)

GHSA-rg3h-x3jw-7jm5
8.1
praisonaiagents Patch: 1.6.8 CWE-89 11

Need deeper analysis?

Get ATLAS technique mappings, compliance reports (ISO 42001, EU AI Act), breaking alerts, and full CISO analysis with a Pro subscription.

Start 14-Day Free Trial