AI Security Threat Feed
Latest CVEs affecting AI/ML systems, updated continuously. Tracked from NVD, GitHub Advisory, and CISA KEV.
AI/ML CVEs Tracked
Critical
New This Week
In CISA KEV
Latest AI Security Threats
Showing 20 of 512 results — has patchA security vulnerability has been detected in langflow-ai langflow up to 1.8.3. The affected element is the function create_project/encrypt_auth_settings of...
CVE-2026-6598 A security flaw has been discovered in langflow-ai langflow up to 1.1.0. This issue affects the function create_upload_file of the file...
CVE-2026-6596 Flowise: Airtable_Agent Code Injection Remote Code Execution Vulnerability
GHSA-v38x-c887-992f OpenClaw: QMD memory_get restricts reads to canonical or indexed memory paths
GHSA-f934-5rqf-xx47 OpenClaw: Webchat media embedding enforces local-root containment for tool-result files
GHSA-mr34-9552-qr95 OpenClaw: Feishu webhook and card-action validation now fail closed
GHSA-xh72-v6v9-mwhc OpenClaw: Matrix room control-command authorization no longer trusts DM pairing-store entries
GHSA-2gvc-4f3c-2855 OpenClaw: Gateway HTTP endpoints re-resolve bearer auth after SecretRef rotation
GHSA-xmxx-7p24-h892 PraisonAI: SQL Injection via unvalidated `table_prefix` in 9 conversation store backends (incomplete fix for CVE-2026-40315)
GHSA-rg3h-x3jw-7jm5 Incomplete fix for CVE-2026-34935: Command Injection in MervinPraison/PraisonAI
GHSA-9qhq-v63v-fv3j Claude Code: Insecure System-Wide Configuration Loading Enables Local Privilege Escalation on Windows
CVE-2026-35603 OpenClaw: CDP /json/version WebSocket URL could pivot to untrusted second-hop targets
GHSA-f7fh-qg34-x2xh OpenClaw: Sender policy bypass in host media attachment reads allows unauthorized local file disclosure
GHSA-jhpv-5j76-m56h OpenClaw: QQBot media tags could read arbitrary local files through reply text
GHSA-66r7-m7xm-v49h OpenClaw: busybox and toybox applet execution weakened exec approval binding
GHSA-2cq5-mf3v-mx44 OpenClaw: Matrix profile config persistence was reachable from operator.write message tools
GHSA-7jp6-r74r-995q OpenClaw: Sandboxed agents could escape exec routing via host=node override
GHSA-736r-jwj6-4w23 OpenClaw: Browser press/type interaction routes missed complete navigation guard coverage
GHSA-536q-mj95-h29h OpenClaw: Browser interaction routes could pivot into local CDP and regain file reads
GHSA-qmwg-qprg-3j38 OpenClaw: Workspace provider auth choices could auto-enable untrusted provider plugins
GHSA-939r-rj45-g2rj Need deeper analysis?
Get ATLAS technique mappings, compliance reports (ISO 42001, EU AI Act), breaking alerts, and full CISO analysis with a Pro subscription.
Start 14-Day Free Trial
AI Threat Alert