AI Security Threat Feed

Latest CVEs affecting AI/ML systems, updated continuously. Tracked from NVD, GitHub Advisory, and CISA KEV.

1,604

AI/ML CVEs Tracked

225

Critical

77

New This Week

16

In CISA KEV

Latest AI Security Threats

Showing 20 of 512 results — has patch
MEDIUM

OpenClaw: Existing-session browser interaction routes bypassed SSRF policy enforcement

GHSA-527m-976r-jf79
--
openclaw Patch: 2026.4.10 CWE-918 4
MEDIUM

OpenClaw: Browser tabs action select and close routes bypassed SSRF policy

GHSA-rj2p-j66c-mgqh
--
openclaw Patch: 2026.4.10 CWE-918 4
MEDIUM

OpenClaw: Nostr profile mutation routes allowed operator.write config persistence

GHSA-f3h5-h452-vp3j
--
openclaw Patch: 2026.4.10 CWE-266 4
HIGH

OpenClaw: Sandbox browser CDP relay could expose DevTools protocol on 0.0.0.0

GHSA-525j-hqq2-66r4
--
openclaw Patch: 2026.4.10 CWE-284 4
HIGH

OpenClaw: Channel setup catalog lookups could include untrusted workspace plugin shadows

GHSA-82qx-6vj7-p8m2
--
openclaw Patch: 2026.4.10 CWE-862 4
MEDIUM

OpenClaw: screen_record outPath bypassed workspace-only filesystem guard

GHSA-jf25-7968-h2h5
--
openclaw Patch: 2026.4.10 CWE-22 4
MEDIUM

OpenClaw: Browser SSRF policy default allowed private-network navigation

GHSA-53vx-pmqw-863c
--
openclaw Patch: 2026.4.14 CWE-918 4
MEDIUM

OpenClaw: Browser SSRF hostname validation could be bypassed by DNS rebinding

GHSA-xq94-r468-qwgj
--
openclaw Patch: 2026.4.10 CWE-350 4
MEDIUM

OpenClaw: QQBot reply media URL handling could trigger SSRF and re-upload fetched bytes

GHSA-2767-2q9v-9326
--
openclaw Patch: 2026.4.12 CWE-918 4
MEDIUM

OpenClaw: Workspace .env could inject OpenClaw runtime-control variables

GHSA-7wv4-cc7p-jhxc
--
openclaw Patch: 2026.4.9 CWE-15 4
MEDIUM

OpenClaw: Discord event cover images bypassed sandbox media normalization

GHSA-c9h3-5p7r-mrjh
--
openclaw Patch: 2026.4.10 CWE-22 4
MEDIUM

OpenClaw: Empty approver lists could grant explicit approval authorization

GHSA-49cg-279w-m73x
--
openclaw Patch: 2026.4.12 CWE-862 4
MEDIUM

OpenClaw: Agent hook events could enqueue trusted system events from unsanitized external input

GHSA-7g8c-cfr3-vqqr
--
openclaw Patch: 2026.4.10 CWE-269 4
HIGH

OpenClaw: Exec environment denylist missed high-risk interpreter startup variables

GHSA-vfp4-8x56-j7c5
--
openclaw Patch: 2026.4.10 CWE-184 4
MEDIUM

OpenClaw: Shell-wrapper detection missed env-argv assignment injection forms

GHSA-j6c7-3h5x-99g9
--
openclaw Patch: 2026.4.12 CWE-78 4
MEDIUM

OpenClaw: Memory dreaming config persistence was reachable from operator.write commands

GHSA-5gjc-grvm-m88j
--
openclaw Patch: 2026.4.10 CWE-266 4
LOW

OpenClaw: Microsoft Teams SSO invoke handler missed sender authorization checks

GHSA-gc9r-867r-j85f
--
openclaw Patch: 2026.4.14 CWE-862 4
LOW

OpenClaw: Delivery queue recovery could lose group tool-policy context for media replay

GHSA-r77c-2cmr-7p47
--
openclaw Patch: 2026.4.14 CWE-862 4
MEDIUM

OpenClaw: Heartbeat owner downgrade missed local async exec completion events

GHSA-g375-h3v6-4873
--
openclaw Patch: 2026.4.10 CWE-269 4
HIGH

OpenClaw: Voice-call realtime WebSocket accepted oversized frames

GHSA-vw3h-q6xq-jjm5
--
openclaw Patch: 2026.4.10 CWE-400 4

Need deeper analysis?

Get ATLAS technique mappings, compliance reports (ISO 42001, EU AI Act), breaking alerts, and full CISO analysis with a Pro subscription.

Start 14-Day Free Trial