AI Security Threat Feed

Latest CVEs affecting AI/ML systems, updated continuously. Tracked from NVD, GitHub Advisory, and CISA KEV.

1,604

AI/ML CVEs Tracked

225

Critical

76

New This Week

16

In CISA KEV

Latest AI Security Threats

Showing 20 of 684 results — High severity
HIGH EXPLOIT AVAIL

Flowise: mass assignment enables cross-workspace IDOR

CVE-2026-41277
8.8
EPSS 0.1%
Auth Bypass Data Extraction Model Poisoning Agent RAG Framework
flowise CWE-284 4 ATLAS
HIGH EXPLOIT AVAIL

Flowise: HTTP password reset link allows MITM takeover

CVE-2026-41275
7.5
EPSS 0.0%
Auth Bypass Data Extraction Agent Framework
flowise CWE-319 4 ATLAS
HIGH EXPLOIT AVAIL

Flowise: auth bypass exposes OAuth 2.0 tokens

CVE-2026-41273
8.2
EPSS 0.1%
Auth Bypass Data Extraction Agent Framework
flowise CWE-306 5 ATLAS
HIGH EXPLOIT AVAIL

Flowise: SSRF bypass via DNS rebinding exposes internal networks

CVE-2026-41272
7.1
EPSS 0.0%
Auth Bypass Data Extraction Agent Framework
flowise 5 ATLAS
HIGH EXPLOIT AVAIL

Flowise: SSRF via prompt template injection in API Chain

CVE-2026-41271
8.3
EPSS 0.1%
Prompt Injection Data Extraction Agent Framework
flowise CWE-918 5 ATLAS
HIGH EXPLOIT AVAIL

Flowise: SSRF bypass exposes cloud metadata services

CVE-2026-41270
8.3
EPSS 0.0%
Auth Bypass Data Extraction Privacy Violation Framework Agent Plugin
flowise CWE-284 5 ATLAS
HIGH EXPLOIT AVAIL

Flowise: unrestricted file upload enables persistent RCE

CVE-2026-41269
8.8
EPSS 0.1%
Code Execution Auth Bypass Data Extraction Agent Framework
flowise CWE-434 6 ATLAS
HIGH EXPLOIT AVAIL

Flowise: unauthenticated API key exposure via chatbot config

CVE-2026-41266
7.5
EPSS 0.0%
Auth Bypass Data Extraction Data Leakage Agent Framework API
flowise CWE-200 6 ATLAS
HIGH EXPLOIT AVAIL

Flowise: RCE via unsanitized input in AirtableAgent

CVE-2026-41138
8.8
EPSS 0.3%
Code Execution Prompt Injection Agent Framework
flowise CWE-94 4 ATLAS
HIGH EXPLOIT AVAIL

Flowise: RCE via CSVAgent unsanitized code injection

CVE-2026-41137
8.8
EPSS 0.3%
Code Execution Data Extraction Agent Framework
flowise 4 ATLAS
HIGH

engramx: CSRF injects persistent prompts into AI agents

GHSA-2r2p-4cgf-hv7h
--
Prompt Injection Data Extraction Auth Bypass Agent Plugin
CWE-306 5 ATLAS
HIGH

InstructLab: RCE via hardcoded trust_remote_code flag

CVE-2026-6859
8.8
EPSS 0.1%
Supply Chain Code Execution Model Training Data
CWE-829 5 ATLAS
HIGH

Claude Code: sandbox escape via symlink allows arbitrary write

CVE-2026-39861
--
EPSS 0.2%
Code Execution Prompt Injection Auth Bypass Agent
@anthropic-ai/claude-code Patch: 2.1.64 CWE-22 5 ATLAS
HIGH EXPLOIT AVAIL

Langflow: unauthenticated file upload allows RCE

CVE-2026-6596
7.3
EPSS 0.1%
Code Execution Auth Bypass Framework Agent
langflow-base Patch: 1.9.1 CWE-284 4 ATLAS
HIGH

openclaw: path traversal leaks files and NTLM credentials

GHSA-mr34-9552-qr95
--
Data Extraction Data Leakage Agent Plugin
openclaw Patch: 2026.4.15 CWE-22 4 4 ATLAS 1 incident
HIGH

OpenClaw: auth bypass lets DM senders run room commands

GHSA-2gvc-4f3c-2855
--
Auth Bypass Code Execution Agent
openclaw Patch: 2026.4.15 CWE-863 4 3 ATLAS 1 incident
HIGH

OpenClaw: stale bearer token survives SecretRef rotation

GHSA-xmxx-7p24-h892
--
Auth Bypass Agent API
openclaw Patch: 2026.4.15 CWE-324 4 3 ATLAS 1 incident
HIGH

PraisonAI: SQL injection across 9 DB backends

GHSA-rg3h-x3jw-7jm5
8.1
Data Extraction Code Execution Data Leakage Framework Agent
praisonaiagents Patch: 1.6.8 CWE-89 11 4 ATLAS
HIGH

openclaw: path traversal exposes host files via media tags

GHSA-66r7-m7xm-v49h
--
Data Extraction Data Leakage Privacy Violation Agent
openclaw Patch: 2026.4.10 CWE-22 4 4 ATLAS 1 incident
HIGH

openclaw: exec approval bypass via opaque multi-call binaries

GHSA-2cq5-mf3v-mx44
--
Auth Bypass Code Execution Supply Chain Agent Plugin
openclaw Patch: 2026.4.12 CWE-863 4 5 ATLAS 1 incident

Need deeper analysis?

Get ATLAS technique mappings, compliance reports (ISO 42001, EU AI Act), breaking alerts, and full CISO analysis with a Pro subscription.

Start 14-Day Free Trial