AI Security Threat Feed

Latest CVEs affecting AI/ML systems, updated continuously. Tracked from NVD, GitHub Advisory, and CISA KEV.

1,625

AI/ML CVEs Tracked

230

Critical

87

New This Week

16

In CISA KEV

Latest AI Security Threats

Showing 20 of 1625 results
MEDIUM

n8n-mcp: credential exposure via HTTP transport logging

GHSA-wg4g-395p-mqv3
4.3
Data Leakage Privacy Violation Agent Plugin
n8n-mcp Patch: 2.47.13 CWE-532 16 4 ATLAS
HIGH

litellm: RCE via MCP test endpoints privilege bypass

GHSA-v4p8-mg3p-g94g
--
Auth Bypass Code Execution API Inference
litellm Patch: 1.83.7 CWE-78 4 5 ATLAS
LOW

langchain-openai: SSRF via DNS rebinding in image token counter

CVE-2026-41488
3.1
EPSS 0.0%
Data Extraction Auth Bypass Framework Agent
langchain CWE-918 2.6K 3 ATLAS
MEDIUM

LangChain: SSRF redirect bypass exposes internal endpoints

CVE-2026-41481
6.5
EPSS 0.0%
Data Extraction Auth Bypass Framework RAG
langchain CWE-918 2.6K 3 ATLAS
CRITICAL

Gemini CLI: RCE via malicious workspace in CI/CD

GHSA-wpqr-6v78-jr5g
10.0
Code Execution Prompt Injection Supply Chain Agent Framework
CWE-20 7 ATLAS
HIGH

Claude Code: git worktree trust bypass executes hooks

CVE-2026-40068
--
EPSS 0.1%
Auth Bypass Code Execution Supply Chain Agent Framework Plugin
@anthropic-ai/claude-code Patch: 2.1.84 CWE-20 5 ATLAS
CRITICAL

litellm: SQLi exposes all managed LLM API credentials

GHSA-r75f-5x8p-qvmc
--
Auth Bypass Data Extraction Inference API
litellm Patch: 1.83.7 CWE-89 4 5 ATLAS
HIGH

Ray: Parquet RCE via Arrow extension deserialization

CVE-2026-41486
--
EPSS 0.1%
Code Execution Supply Chain Framework Training Data
ray Patch: 2.55.0 CWE-94 847 5 ATLAS
HIGH

LiteLLM: RCE via unsandboxed prompt template rendering

GHSA-xqmj-j6mv-4862
--
Code Execution Data Extraction Inference API
litellm Patch: 1.83.7 CWE-1336 4 5 ATLAS
MEDIUM

BetterDocs: Auth bypass drains OpenAI API quota

CVE-2026-6393
4.3
EPSS 0.0%
Auth Bypass DoS Data Extraction API Plugin
CWE-862 5 ATLAS
CRITICAL EXPLOIT AVAIL

Flowise: Cypher injection via GraphCypherQAChain node

CVE-2026-41274
9.8
EPSS 0.1%
Data Extraction Code Execution Agent Framework
flowise CWE-943 5 ATLAS
HIGH EXPLOIT AVAIL

Flowise: unauth API key abuse via TTS endpoint IDOR

CVE-2026-41279
7.5
EPSS 0.1%
Auth Bypass DoS Data Extraction Agent API Framework
flowise CWE-639 5 ATLAS
HIGH EXPLOIT AVAIL

Flowise: credential exposure in public chatflow API

CVE-2026-41278
7.5
EPSS 0.0%
Data Extraction Auth Bypass Agent Framework
flowise CWE-200 5 ATLAS
HIGH EXPLOIT AVAIL

Flowise: mass assignment enables cross-workspace IDOR

CVE-2026-41277
8.8
EPSS 0.1%
Auth Bypass Data Extraction Model Poisoning Agent RAG Framework
flowise CWE-284 4 ATLAS
CRITICAL EXPLOIT AVAIL

Flowise: auth bypass enables full account takeover via reset

CVE-2026-41276
9.8
EPSS 0.2%
Auth Bypass Data Extraction Code Execution Agent Framework
flowise CWE-287 5 ATLAS
HIGH EXPLOIT AVAIL

Flowise: HTTP password reset link allows MITM takeover

CVE-2026-41275
7.5
EPSS 0.0%
Auth Bypass Data Extraction Agent Framework
flowise CWE-319 4 ATLAS
HIGH EXPLOIT AVAIL

Flowise: auth bypass exposes OAuth 2.0 tokens

CVE-2026-41273
8.2
EPSS 0.1%
Auth Bypass Data Extraction Agent Framework
flowise CWE-306 5 ATLAS
HIGH EXPLOIT AVAIL

Flowise: SSRF bypass via DNS rebinding exposes internal networks

CVE-2026-41272
7.1
EPSS 0.0%
Auth Bypass Data Extraction Agent Framework
flowise 5 ATLAS
HIGH EXPLOIT AVAIL

Flowise: SSRF via prompt template injection in API Chain

CVE-2026-41271
8.3
EPSS 0.1%
Prompt Injection Data Extraction Agent Framework
flowise CWE-918 5 ATLAS
HIGH EXPLOIT AVAIL

Flowise: SSRF bypass exposes cloud metadata services

CVE-2026-41270
8.3
EPSS 0.0%
Auth Bypass Data Extraction Privacy Violation Framework Agent Plugin
flowise CWE-284 5 ATLAS

Need deeper analysis?

Get ATLAS technique mappings, compliance reports (ISO 42001, EU AI Act), breaking alerts, and full CISO analysis with a Pro subscription.

Start 14-Day Free Trial