AI Security Threat Feed

Latest CVEs affecting AI/ML systems, updated continuously. Tracked from NVD, GitHub Advisory, and CISA KEV.

1,604

AI/ML CVEs Tracked

225

Critical

76

New This Week

16

In CISA KEV

Latest AI Security Threats

Showing 20 of 220 results — Medium severity, has patch
MEDIUM

nbconvert: path traversal enables arbitrary file write

CVE-2026-39377
6.5
EPSS 0.0%
Supply Chain Code Execution Framework
nbconvert Patch: 7.17.1 CWE-22 2.9K 3 ATLAS
MEDIUM EXPLOIT AVAIL

Langflow: cleartext auth storage exposes API keys

CVE-2026-6598
4.3
EPSS 0.0%
Data Extraction Privacy Violation Framework
langflow Patch: 1.9.1 CWE-312 5 ATLAS
MEDIUM

OpenClaw: path traversal in memory_get reads arbitrary workspace files

GHSA-f934-5rqf-xx47
--
Data Extraction Auth Bypass Agent Plugin
openclaw Patch: 2026.4.15 CWE-22 4 4 ATLAS 1 incident
MEDIUM

Claude Code: Insecure System-Wide Configuration Loading Enables Local Privilege Escalation on Windows

CVE-2026-35603
--
EPSS 0.0%
@anthropic-ai/claude-code Patch: 2.1.75 CWE-426
MEDIUM

OpenClaw: CDP /json/version WebSocket URL could pivot to untrusted second-hop targets

GHSA-f7fh-qg34-x2xh
--
openclaw Patch: 2026.4.5 CWE-918 4
MEDIUM

OpenClaw: Sender policy bypass in host media attachment reads allows unauthorized local file disclosure

GHSA-jhpv-5j76-m56h
--
openclaw Patch: 2026.4.10 CWE-863 4
MEDIUM

OpenClaw: Browser press/type interaction routes missed complete navigation guard coverage

GHSA-536q-mj95-h29h
--
openclaw Patch: 2026.4.10 CWE-918 4
MEDIUM

OpenClaw: Browser interaction routes could pivot into local CDP and regain file reads

GHSA-qmwg-qprg-3j38
--
openclaw Patch: 2026.4.9 CWE-693 4
MEDIUM

OpenClaw: Existing-session browser interaction routes bypassed SSRF policy enforcement

GHSA-527m-976r-jf79
--
openclaw Patch: 2026.4.10 CWE-918 4
MEDIUM

OpenClaw: Browser tabs action select and close routes bypassed SSRF policy

GHSA-rj2p-j66c-mgqh
--
openclaw Patch: 2026.4.10 CWE-918 4
MEDIUM

OpenClaw: Nostr profile mutation routes allowed operator.write config persistence

GHSA-f3h5-h452-vp3j
--
openclaw Patch: 2026.4.10 CWE-266 4
MEDIUM

OpenClaw: screen_record outPath bypassed workspace-only filesystem guard

GHSA-jf25-7968-h2h5
--
openclaw Patch: 2026.4.10 CWE-22 4
MEDIUM

OpenClaw: Browser SSRF policy default allowed private-network navigation

GHSA-53vx-pmqw-863c
--
openclaw Patch: 2026.4.14 CWE-918 4
MEDIUM

OpenClaw: Browser SSRF hostname validation could be bypassed by DNS rebinding

GHSA-xq94-r468-qwgj
--
openclaw Patch: 2026.4.10 CWE-350 4
MEDIUM

OpenClaw: QQBot reply media URL handling could trigger SSRF and re-upload fetched bytes

GHSA-2767-2q9v-9326
--
openclaw Patch: 2026.4.12 CWE-918 4
MEDIUM

OpenClaw: Workspace .env could inject OpenClaw runtime-control variables

GHSA-7wv4-cc7p-jhxc
--
openclaw Patch: 2026.4.9 CWE-15 4
MEDIUM

OpenClaw: Discord event cover images bypassed sandbox media normalization

GHSA-c9h3-5p7r-mrjh
--
openclaw Patch: 2026.4.10 CWE-22 4
MEDIUM

OpenClaw: Empty approver lists could grant explicit approval authorization

GHSA-49cg-279w-m73x
--
openclaw Patch: 2026.4.12 CWE-862 4
MEDIUM

OpenClaw: Agent hook events could enqueue trusted system events from unsanitized external input

GHSA-7g8c-cfr3-vqqr
--
openclaw Patch: 2026.4.10 CWE-269 4
MEDIUM

OpenClaw: Shell-wrapper detection missed env-argv assignment injection forms

GHSA-j6c7-3h5x-99g9
--
openclaw Patch: 2026.4.12 CWE-78 4

Need deeper analysis?

Get ATLAS technique mappings, compliance reports (ISO 42001, EU AI Act), breaking alerts, and full CISO analysis with a Pro subscription.

Start 14-Day Free Trial