AI Security Threat Feed

Latest CVEs affecting AI/ML systems, updated continuously. Tracked from NVD, GitHub Advisory, and CISA KEV.

1,604

AI/ML CVEs Tracked

225

Critical

78

New This Week

16

In CISA KEV

Latest AI Security Threats

Showing 18 of 58 results — Critical severity, has patch
CRITICAL EXPLOIT AVAIL

keras: Deserialization enables RCE

CVE-2025-49655
9.8
EPSS 0.1%
Code Execution Supply Chain Framework Model
keras Patch: 3.11.3 CWE-502 1.5K 5 ATLAS
CRITICAL EXPLOIT AVAIL

ExecuTorch: OOB read in model loader enables RCE

CVE-2025-54950
9.8
EPSS 0.3%
Code Execution Supply Chain Framework Model Inference
executorch Patch: 0.7.0 CWE-125 2 4 ATLAS
CRITICAL

ExecuTorch: heap buffer overflow RCE via model loading

CVE-2025-54949
9.8
EPSS 0.3%
Code Execution Supply Chain Framework Model
executorch Patch: 0.7.0 CWE-122 2 5 ATLAS
CRITICAL

ExecuTorch: heap buffer overflow RCE in model loading

CVE-2025-54951
9.8
EPSS 0.3%
Code Execution Supply Chain Framework Model Inference
executorch Patch: 0.7.0 CWE-122 2 4 ATLAS
CRITICAL

ExecuTorch: integer overflow in model load → RCE

CVE-2025-30405
9.8
EPSS 0.2%
Code Execution Supply Chain Framework Model Inference
executorch Patch: 0.7.0 CWE-190 2 4 ATLAS
CRITICAL

ExecuTorch: integer overflow RCE on model load

CVE-2025-30404
9.8
EPSS 0.2%
Code Execution Supply Chain Framework Model Inference
executorch Patch: 0.7.0 CWE-190 2 5 ATLAS
CRITICAL EXPLOIT AVAIL

llama_index: SQL injection in vector store integrations

CVE-2025-1793
9.8
EPSS 0.1%
Data Extraction Data Leakage Supply Chain Framework RAG
llama-index Patch: 0.12.28 CWE-89 229 5 ATLAS
CRITICAL EXPLOIT AVAIL

browser-use: URL allowlist bypass enables SSRF in agents

CVE-2025-47241
9.3
EPSS 0.2%
Auth Bypass Data Extraction Agent Framework
browser-use Patch: 0.1.45 CWE-647 65 5 ATLAS
CRITICAL

vLLM: RCE via malicious model, PyTorch < 2.6 bypass

GHSA-ggpf-24jw-3fcw
9.8
Code Execution Supply Chain Framework Inference Model
vllm Patch: 0.8.0 CWE-1395 126 5 ATLAS
CRITICAL EXPLOIT AVAIL

jupyter-remote-desktop-proxy: VNC network exposure

CVE-2025-32428
--
EPSS 0.2%
Auth Bypass Data Leakage Privacy Violation Framework
jupyter-remote-desktop-proxy Patch: 3.0.1 CWE-668 1.9K 5 ATLAS
CRITICAL EXPLOIT AVAIL

pytorch-lightning: file upload RCE (Windows)

CVE-2024-8019
9.1
EPSS 2.1%
Code Execution Supply Chain Framework Training Data
pytorch-lightning Patch: 2.4.0 CWE-434 1.6K 4 ATLAS
CRITICAL EXPLOIT AVAIL

llama-index DuckDB retriever: SQLi enables RCE

CVE-2024-11958
9.8
EPSS 4.1%
Code Execution Supply Chain Data Extraction Framework RAG Plugin
llama-index-retrievers-duckdb-retriever Patch: 0.4.0 CWE-89 229 5 ATLAS
CRITICAL EXPLOIT AVAIL

spacy-llm: SSTI allows unauthenticated RCE (CVSS 9.8)

CVE-2025-25362
9.8
EPSS 0.0%
Code Execution Data Extraction Framework
spacy-llm Patch: 0.7.3 CWE-94 154 4 ATLAS
CRITICAL EXPLOIT AVAIL

LlamaFactory: RCE via OS command injection in training

CVE-2024-52803
9.8
EPSS 3.2%
Code Execution Supply Chain Framework Training Data
llamafactory Patch: 0.9.1 CWE-78 1 6 ATLAS
CRITICAL EXPLOIT AVAIL SCANNER

Ray: unauthenticated LFI exposes entire filesystem

CVE-2023-6020
9.3
EPSS 81.4%
Data Extraction Auth Bypass Framework Training Data Model
ray Patch: 2.8.1 CWE-598 845 5 ATLAS
CRITICAL EXPLOIT AVAIL SCANNER

Ray: LFI allows unauthenticated file read

CVE-2023-6021
9.3
EPSS 87.3%
Data Extraction Auth Bypass Framework Inference
ray Patch: 2.8.1 CWE-22 845 5 ATLAS
CRITICAL EXPLOIT AVAIL

Ray: unauthenticated RCE via dashboard command injection

CVE-2023-6019
9.8
EPSS 88.8%
Code Execution Auth Bypass Supply Chain Framework Inference Training Data
ray Patch: 2.8.1 CWE-78 845 6 ATLAS
CRITICAL

LangChain: prompt injection → SQL RCE (CVSS 9.8)

CVE-2023-32785
9.8
Prompt Injection Code Execution Data Extraction Framework Agent
langchain Patch: 0.0.247 CWE-74 2.6K 5 ATLAS

Need deeper analysis?

Get ATLAS technique mappings, compliance reports (ISO 42001, EU AI Act), breaking alerts, and full CISO analysis with a Pro subscription.

Start 14-Day Free Trial