AI Security Threat Feed

Latest CVEs affecting AI/ML systems, updated continuously. Tracked from NVD, GitHub Advisory, and CISA KEV.

1,604

AI/ML CVEs Tracked

225

Critical

76

New This Week

16

In CISA KEV

Latest AI Security Threats

Showing 20 of 1604 results
HIGH EXPLOIT AVAIL

Picklescan: CRC bypass hides malicious pickle in ZIP

CVE-2025-10156
7.5
EPSS 1.0%
Supply Chain Code Execution Model Framework
picklescan Patch: 0.0.31 CWE-693 3 5 ATLAS 1 incident
HIGH EXPLOIT AVAIL

PickleScan: subclass bypass enables malicious model RCE

CVE-2025-10157
8.3
EPSS 0.2%
Supply Chain Code Execution Model Framework
picklescan Patch: 0.0.31 CWE-693 3 5 ATLAS 1 incident
HIGH EXPLOIT AVAIL

MONAI: unsafe pickle deserialization RCE in data pipeline

CVE-2025-58757
8.8
EPSS 0.8%
Code Execution Supply Chain Framework Training Data
monai Patch: 1.5.1 CWE-502 105 5 ATLAS
HIGH EXPLOIT AVAIL

MONAI: unsafe deserialization in CheckpointLoader allows RCE

CVE-2025-58756
8.8
EPSS 1.7%
Code Execution Supply Chain Framework Training Data
monai Patch: 1.5.1 CWE-502 105 5 ATLAS
HIGH EXPLOIT AVAIL

MONAI: path traversal allows arbitrary file write

CVE-2025-58755
8.8
EPSS 0.1%
Supply Chain Code Execution Framework
monai Patch: 1.5.1 CWE-22 105 4 ATLAS
HIGH EXPLOIT AVAIL

n8n: unrestricted file upload RCE via Chat Trigger

CVE-2025-56265
8.8
EPSS 0.1%
Code Execution Data Extraction Auth Bypass Framework Agent Plugin
n8n 16 5 ATLAS
MEDIUM EXPLOIT AVAIL

xgrammar: DoS via oversized JSON schema grammar parsing

CVE-2025-58446
--
EPSS 0.1%
DoS Inference Framework
xgrammar Patch: 0.1.24 CWE-770 154 3 ATLAS
HIGH EXPLOIT AVAIL SCANNER

EverNoteLoader: XXE exposes host files in LangChain

CVE-2025-6984
7.5
EPSS 1.9%
Data Extraction Data Leakage Framework RAG
langchain-community Patch: 0.3.27 CWE-200 1.2K 4 ATLAS
MEDIUM

picklescan: scanner bypass enables model RCE

GHSA-q77w-mwjj-7mqx
--
Supply Chain Code Execution Framework Model
picklescan Patch: 0.0.30 3 6 ATLAS
MEDIUM

picklescan: scanner bypass enables RCE via ML model files

GHSA-49gj-c84q-6qm9
--
Supply Chain Code Execution Model Framework
picklescan Patch: 0.0.30 3 5 ATLAS
MEDIUM

picklescan: scan bypass allows silent RCE via ML models

GHSA-9w88-8rmg-7g2p
--
Supply Chain Code Execution Model Framework
picklescan Patch: 0.0.30 3 6 ATLAS
MEDIUM

picklescan: detection bypass allows undetected RCE in ML models

GHSA-fqq6-7vqf-w3fg
--
Supply Chain Code Execution Framework Model
picklescan Patch: 0.0.30 3 6 ATLAS
MEDIUM

picklescan: scanner bypass enables pickle RCE in ML models

GHSA-3gf5-cxq9-w223
--
Supply Chain Code Execution Model Framework
picklescan Patch: 0.0.30 3 7 ATLAS
MEDIUM

picklescan: scanner bypass allows pickle-based RCE

GHSA-j343-8v2j-ff7w
--
Supply Chain Code Execution Model Poisoning Model Framework
picklescan Patch: 0.0.30 3 6 ATLAS
MEDIUM

picklescan: scanner bypass enables RCE via ML models

GHSA-m869-42cg-3xwr
--
Supply Chain Code Execution Model Framework
picklescan Patch: 0.0.30 3 7 ATLAS
MEDIUM

picklescan: detection bypass allows pickle RCE in ML pipelines

GHSA-p9w7-82w4-7q8m
--
Supply Chain Code Execution Framework Model
picklescan Patch: 0.0.30 3 5 ATLAS
MEDIUM

picklescan: scanner bypass leads to undetected RCE

GHSA-xp4f-hrf8-rxw7
--
Supply Chain Code Execution Model Framework
picklescan Patch: 0.0.30 3 6 ATLAS
MEDIUM

picklescan: scanner bypass enables PyTorch gadget RCE

GHSA-4whj-rm5r-c2v8
--
Supply Chain Code Execution Framework Model
picklescan Patch: 0.0.30 3 6 ATLAS
MEDIUM

picklescan: scanner bypass enables RCE via model files

GHSA-9xph-j2h6-g47v
--
Supply Chain Code Execution Model Framework
picklescan Patch: 0.0.29 3 6 ATLAS
MEDIUM

picklescan: RCE bypass enables ML supply chain attack

GHSA-8r4j-24qv-fmq9
--
Supply Chain Code Execution Framework Model
picklescan Patch: 0.0.29 3 6 ATLAS

Need deeper analysis?

Get ATLAS technique mappings, compliance reports (ISO 42001, EU AI Act), breaking alerts, and full CISO analysis with a Pro subscription.

Start 14-Day Free Trial