AI Security Threat Feed

Latest CVEs affecting AI/ML systems, updated continuously. Tracked from NVD, GitHub Advisory, and CISA KEV.

1,625

AI/ML CVEs Tracked

230

Critical

87

New This Week

16

In CISA KEV

Latest AI Security Threats

Showing 20 of 1625 results
HIGH

praisonai: RCE via unpatched tool_override exec_module

CVE-2026-44334
8.4
EPSS 0.0%
Code Execution Auth Bypass Supply Chain Agent Framework Plugin
praisonai Patch: 4.6.32 CWE-94 1 5 ATLAS
HIGH EXPLOIT AVAIL

praisonaiagents: SSRF via URL parser confusion bypass

CVE-2026-44335
--
EPSS 0.0%
Auth Bypass Data Extraction Agent Plugin
praisonaiagents Patch: 1.6.32 CWE-918 11 4 ATLAS
HIGH EXPLOIT AVAIL

GitPython: git config injection enables hook RCE

CVE-2026-44244
7.8
EPSS 0.0%
Supply Chain Code Execution Framework
GitPython Patch: 3.1.49 CWE-94 81 3 ATLAS
MEDIUM

vLLM: speculative decoding DoS via penalty params

CVE-2026-44223
6.5
DoS Inference
vllm Patch: 0.20.0 CWE-131 127 2 ATLAS
HIGH

JupyterLab: one-click RCE via notebook HTML cell output

CVE-2026-42557
--
Code Execution Social Engineering Supply Chain Framework Plugin
notebook Patch: 7.5.6 CWE-79 2.9K 8 ATLAS
HIGH EXPLOIT AVAIL

mistune: ReDoS exposes Jupyter/AI services to DoS

CVE-2026-33079
--
EPSS 0.0%
DoS Supply Chain Framework API
mistune Patch: 3.2.1 CWE-1333 1.9K 4 ATLAS
MEDIUM

vLLM: token injection DoS via multimodal placeholders

CVE-2026-44222
6.5
DoS Prompt Injection Inference Model Framework
vllm Patch: 0.20.0 CWE-129 127 5 ATLAS
LOW

ciguard: symlink traversal exposes secrets via MCP agent

CVE-2026-44220
--
Data Extraction Supply Chain Agent Plugin
CWE-59 6 ATLAS
HIGH

JupyterLab: Extension allow-list bypass enables privesc

CVE-2026-42266
8.8
Supply Chain Auth Bypass Code Execution Framework Plugin
jupyterlab Patch: 4.5.7 CWE-20 1.9K 4 ATLAS
MEDIUM

wireshark-mcp: path traversal enables arbitrary file write via MCP

CVE-2026-43901
6.8
Prompt Injection Code Execution Supply Chain Agent Plugin
CWE-22 5 ATLAS
HIGH EXPLOIT AVAIL

PPTAgent: eval injection enables RCE via LLM prompt injection

CVE-2026-42079
8.6
EPSS 0.0%
Prompt Injection Code Execution Agent Framework
CWE-95 5 ATLAS
HIGH

openclaw: Model bypasses authz to persist unsafe config

GHSA-cwj3-vqpp-pmxr
8.8
Prompt Injection Auth Bypass Code Execution Agent Plugin Framework
openclaw Patch: 2026.4.23 CWE-862 4 5 ATLAS 1 incident
HIGH

OpenClaw: RCE via malicious repo setup-api.js

GHSA-r39h-4c2p-3jxp
7.8
Supply Chain Code Execution Agent Plugin
openclaw Patch: 2026.4.23 CWE-94 4 4 ATLAS 1 incident
MEDIUM

openclaw: stale webhook secret survives credential rotation

GHSA-q8ff-7ffm-m3r9
6.0
Auth Bypass Agent Plugin
openclaw Patch: 2026.4.23 CWE-613 4 3 ATLAS 1 incident
CRITICAL

Langflow: path traversal allows arbitrary directory deletion

CVE-2026-42048
9.6
DoS Auth Bypass Framework RAG
langflow Patch: 1.9.0 CWE-22 3 ATLAS
MEDIUM

JupyterHub: CSRF bypass on spawn and share endpoints

CVE-2026-40864
5.4
Auth Bypass DoS Framework
jupyterhub Patch: 5.4.5 CWE-352 1.9K 4 ATLAS
MEDIUM

LobeChat: XSS-to-RCE via exposed Electron IPC

CVE-2026-42045
6.2
Code Execution Prompt Injection Social Engineering API Agent
@lobehub/lobehub CWE-78 3.7K 6 ATLAS
LOW EXPLOIT AVAIL

Langchain-Chatchat: predictable file IDs leak uploaded files

CVE-2026-7847
2.6
EPSS 0.0%
Data Extraction Privacy Violation Framework API
langchain-chatchat CWE-310 2.6K 4 ATLAS
MEDIUM

jupyter-server: auth cookie survives password reset

CVE-2026-40934
6.8
EPSS 0.1%
Auth Bypass Data Extraction Framework API
jupyter-server Patch: 2.18.0 CWE-613 1.9K 4 ATLAS
HIGH

Jupyter Server: CORS bypass via regex anchor omission

CVE-2026-40110
--
EPSS 0.1%
Auth Bypass Code Execution Data Extraction Framework API
jupyter-server Patch: 2.18.0 CWE-777 1.9K 4 ATLAS

Need deeper analysis?

Get ATLAS technique mappings, compliance reports (ISO 42001, EU AI Act), breaking alerts, and full CISO analysis with a Pro subscription.

Start 14-Day Free Trial