AI Security Threat Feed

Latest CVEs affecting AI/ML systems, updated continuously. Tracked from NVD, GitHub Advisory, and CISA KEV.

1,604

AI/ML CVEs Tracked

225

Critical

76

New This Week

16

In CISA KEV

Latest AI Security Threats

Showing 20 of 1604 results
MEDIUM

picklescan: security bypass enables RCE in ML pipelines

GHSA-cj3c-v495-4xqh
--
Supply Chain Code Execution Model Framework
picklescan Patch: 0.0.29 3 6 ATLAS
MEDIUM

picklescan: detection bypass allows malicious pickle RCE

GHSA-7cq8-mj8x-j263
--
Supply Chain Code Execution Model Framework
picklescan Patch: 0.0.29 3 6 ATLAS
MEDIUM

picklescan: detection bypass allows RCE via ML model files

GHSA-6w4w-5w54-rjvr
--
Supply Chain Code Execution Model Framework
picklescan Patch: 0.0.29 3 6 ATLAS
MEDIUM

picklescan: RCE bypass via idlelib SetText evasion

GHSA-3vg9-h568-4w9m
--
Supply Chain Code Execution Model Framework
picklescan Patch: 0.0.29 3 6 ATLAS
MEDIUM

picklescan: scanner bypass enables RCE in ML models

GHSA-f54q-57x4-jg88
--
Supply Chain Code Execution Framework Model
picklescan Patch: 0.0.29 3 7 ATLAS
MEDIUM

picklescan: scanner bypass enables RCE via ML models

GHSA-6vqj-c2q5-j97w
--
Supply Chain Code Execution Model Framework
picklescan Patch: 0.0.29 3 5 ATLAS
MEDIUM

picklescan: scan bypass allows RCE in ML pipelines

GHSA-x696-vm39-cp64
--
Supply Chain Code Execution Framework Model
picklescan Patch: 0.0.29 3 5 ATLAS
MEDIUM

picklescan: scanner bypass enables RCE in ML pipelines

GHSA-g344-hcph-8vgg
--
Supply Chain Code Execution Model Framework
picklescan Patch: 0.0.29 3 5 ATLAS
MEDIUM

picklescan: bypass enables undetected RCE in ML models

GHSA-5qwp-399c-mjwf
--
Supply Chain Code Execution Model Framework
picklescan Patch: 0.0.29 3 6 ATLAS
CRITICAL EXPLOIT AVAIL

n8n-workflows: path traversal in download_workflow endpoint

CVE-2025-55526
9.1
EPSS 0.6%
Data Extraction Auth Bypass Code Execution Agent Framework API
fastapi 16 5 ATLAS
HIGH EXPLOIT AVAIL

llama-index: JSON parsing DoS via deep recursion

CVE-2025-5302
8.6
EPSS 0.1%
DoS Framework RAG
llama-index-core Patch: 0.12.38 CWE-674 1.1K 3 ATLAS
HIGH EXPLOIT AVAIL

xgrammar: uncontrolled recursion in grammar parsing causes DoS

CVE-2025-57809
7.5
EPSS 0.0%
DoS Supply Chain Framework Inference
xgrammar Patch: 0.1.21 CWE-674 154 3 ATLAS
HIGH EXPLOIT AVAIL

Langflow: privilege escalation to full superuser via CLI

CVE-2025-57760
8.8
EPSS 0.0%
Auth Bypass Code Execution Framework Agent
langflow CWE-269 5 ATLAS
MEDIUM

picklescan: PyTorch gadget bypasses scanner, enables RCE

GHSA-vv6j-3g6g-2pvj
--
Supply Chain Code Execution Framework Model
picklescan Patch: 0.0.28 CWE-345 3 6 ATLAS
MEDIUM

picklescan: PyTorch gadget bypasses pickle RCE detection

GHSA-vr7h-p6mm-wpmh
--
Supply Chain Code Execution Framework Model
picklescan Patch: 0.0.28 CWE-345 3 5 ATLAS
MEDIUM

picklescan: detection bypass via PyTorch proxy RCE

GHSA-h3qp-7fh3-f8h4
--
Supply Chain Code Execution Framework Model
picklescan Patch: 0.0.28 3 7 ATLAS
MEDIUM

picklescan: RCE bypass via torch.utils.collect_env

GHSA-f745-w6jp-hpxx
--
Supply Chain Code Execution Framework Model
picklescan Patch: 0.0.28 CWE-345 3 5 ATLAS
MEDIUM

picklescan: scanner bypass enables RCE via PyTorch function

GHSA-f4x7-rfwp-v3xw
--
Supply Chain Code Execution Framework Model
picklescan Patch: 0.0.28 CWE-345 3 5 ATLAS
MEDIUM

picklescan: detection bypass enables PyTorch model RCE

GHSA-86cj-95qr-2p4f
--
Supply Chain Code Execution Framework Model
picklescan Patch: 0.0.28 CWE-345 3 6 ATLAS
MEDIUM

picklescan: PyTorch bypass allows undetected RCE

GHSA-4r9r-ch6f-vxmx
--
Supply Chain Code Execution Framework Model
picklescan Patch: 0.0.28 CWE-345 3 5 ATLAS

Need deeper analysis?

Get ATLAS technique mappings, compliance reports (ISO 42001, EU AI Act), breaking alerts, and full CISO analysis with a Pro subscription.

Start 14-Day Free Trial