AI Security Threat Feed

Latest CVEs affecting AI/ML systems, updated continuously. Tracked from NVD, GitHub Advisory, and CISA KEV.

1,604

AI/ML CVEs Tracked

225

Critical

76

New This Week

16

In CISA KEV

Latest AI Security Threats

Showing 20 of 570 results — Medium severity
MEDIUM

JupyterHub: CSRF bypass on spawn and share endpoints

CVE-2026-40864
5.4
Auth Bypass DoS Framework
jupyterhub Patch: 5.4.5 CWE-352 1.9K 4 ATLAS
MEDIUM

LobeChat: XSS-to-RCE via exposed Electron IPC

CVE-2026-42045
6.2
Code Execution Prompt Injection Social Engineering API Agent
@lobehub/lobehub CWE-78 3.7K 6 ATLAS
MEDIUM

jupyter-server: auth cookie survives password reset

CVE-2026-40934
6.8
EPSS 0.1%
Auth Bypass Data Extraction Framework API
jupyter-server Patch: 2.18.0 CWE-613 1.9K 4 ATLAS
MEDIUM

jupyter-server: Open redirect enables credential phishing

CVE-2025-61669
--
EPSS 0.0%
Social Engineering Auth Bypass Framework API
jupyter-server Patch: 2.18.0 CWE-601 1.9K 5 ATLAS
MEDIUM

Langchain-Chatchat: auth bypass on file service endpoints

CVE-2026-7844
6.3
EPSS 0.0%
Auth Bypass Data Extraction Framework RAG
CWE-287 5 ATLAS
MEDIUM

OpenClaw: symlink traversal exposes host filesystem

CVE-2026-43570
6.5
EPSS 0.1%
Supply Chain Data Extraction Agent Plugin
openclaw Patch: 2026.4.5 CWE-61 4 4 ATLAS 1 incident
MEDIUM

openclaw: auth bypass exposes Gateway bootstrap config

GHSA-93rg-2xm5-2p9v
--
Auth Bypass Data Leakage Agent API
openclaw Patch: 2026.4.22 CWE-287 4 4 ATLAS 1 incident
MEDIUM

openclaw: TOCTOU race allows out-of-sandbox file read

GHSA-5h3g-6xhh-rg6p
--
Data Extraction Privacy Violation Agent Plugin
openclaw Patch: 2026.4.22 CWE-367 4 4 ATLAS 1 incident
MEDIUM

OpenClaw: exec allowlist bypass allows hidden shell code

GHSA-x3h8-jrgh-p8jx
--
Code Execution Auth Bypass Agent Plugin
openclaw Patch: 2026.4.22 CWE-200 4 4 ATLAS 1 incident
MEDIUM

OpenClaw: .env injection redirects connector endpoints

GHSA-55cf-xx38-4p9p
--
Supply Chain Auth Bypass Data Extraction Agent Plugin
openclaw Patch: 2026.4.22 CWE-427 4 4 ATLAS 1 incident
MEDIUM

openclaw: ACP child session security envelope bypass

GHSA-q3jj-46pq-826r
--
Auth Bypass Code Execution Agent Framework
openclaw Patch: 2026.4.22 CWE-277 4 4 ATLAS 1 incident
MEDIUM

openclaw: SSRF bypass via Zalo plugin photo URLs

GHSA-2hh7-c75g-qj2r
--
Auth Bypass Data Extraction Agent Plugin
openclaw Patch: 2026.4.22 CWE-918 4 3 ATLAS 1 incident
MEDIUM

OpenClaw: sender allowlist bypass via Slack thread context

CVE-2026-41358
5.4
EPSS 0.0%
Auth Bypass Prompt Injection Data Leakage Agent Plugin
openclaw Patch: 2026.4.2 CWE-346 4 4 ATLAS 1 incident
MEDIUM

Langflow: eval() code injection → remote code execution

CVE-2026-7700
6.3
EPSS 0.0%
Code Execution Data Extraction Framework Agent
langflow CWE-74 4 ATLAS
MEDIUM

Langflow: command injection in code parser enables RCE

CVE-2026-7687
6.3
EPSS 1.4%
Code Execution Data Extraction Framework Agent
langflow CWE-74 4 ATLAS
MEDIUM

SGLang: deserialization in tokenizer loader enables RCE

CVE-2026-7669
5.6
EPSS 0.1%
Supply Chain Code Execution Framework Inference
sglang CWE-20 7.9K 3 ATLAS
MEDIUM

Langflow: IDOR exposes cross-tenant flow data and deletion

CVE-2026-6542
6.5
EPSS 0.0%
Data Extraction Privacy Violation Auth Bypass Framework Agent
langflow CWE-639 5 ATLAS
MEDIUM

Langflow: path traversal allows arbitrary file read

CVE-2026-3345
6.5
EPSS 0.1%
Data Extraction Data Leakage Framework Agent
langflow CWE-22 3 ATLAS
MEDIUM

Langflow: path traversal enables arbitrary file write

CVE-2026-4502
6.5
EPSS 0.1%
Code Execution Supply Chain Framework Agent
langflow CWE-22 4 ATLAS
MEDIUM

Langflow Desktop: stored XSS enables credential theft

CVE-2026-3346
6.4
EPSS 0.0%
Data Extraction Auth Bypass Framework
langflow CWE-89 4 ATLAS

Need deeper analysis?

Get ATLAS technique mappings, compliance reports (ISO 42001, EU AI Act), breaking alerts, and full CISO analysis with a Pro subscription.

Start 14-Day Free Trial