AI Security Threat Feed

Latest CVEs affecting AI/ML systems, updated continuously. Tracked from NVD, GitHub Advisory, and CISA KEV.

1,604

AI/ML CVEs Tracked

225

Critical

78

New This Week

16

In CISA KEV

Latest AI Security Threats

Showing 20 of 512 results — has patch
MEDIUM

OpenClaw: Heartbeat owner downgrade missed untrusted webhook wake events

GHSA-g2hm-779g-vm32
--
openclaw Patch: 2026.4.14 CWE-863 4
MEDIUM

OpenClaw: Browser snapshot and screenshot routes could expose internal page content after navigation

GHSA-c4qm-58hj-j6pj
--
openclaw Patch: 2026.4.14 CWE-918 4
HIGH

OpenClaw: config.get redaction bypass through sourceConfig and runtimeConfig aliases

GHSA-8372-7vhw-cm6q
--
openclaw Patch: 2026.4.14 CWE-212 4
MEDIUM

OpenClaw: Collect-mode queue batches could reuse the last sender authorization context

GHSA-jwrq-8g5x-5fhm
--
openclaw Patch: 2026.4.14 CWE-863 4
HIGH

Flowise: Unauthenticated TTS endpoint accepts arbitrary credential IDs — enables API credit abuse via stored credentials

GHSA-5fw2-mwhh-9947
--
flowise Patch: 3.1.0 CWE-639
HIGH

Flowise: Public chatflow endpoints return unsanitized flowData including plaintext API keys, passwords, and credential IDs

GHSA-w47f-j8rh-wx87
--
flowise Patch: 3.1.0
HIGH

Flowise: Mass Assignment in DocumentStore Create Endpoint Leads to Cross-Workspace Object Takeover (IDOR)

GHSA-3prp-9gf7-4rxx
--
flowise Patch: 3.1.0 CWE-284
MEDIUM

OpenClaw: Sandbox noVNC helper route exposed interactive browser session credentials

GHSA-92jp-89mq-4374
--
openclaw Patch: 2026.4.10 CWE-306 4
LOW

langchain-openai: SSRF DNS rebinding, blind network probe

GHSA-r7w7-9xr2-qq2r
3.1
Data Extraction Supply Chain Framework API
langchain-openai Patch: 1.1.14 CWE-918 3.7K 3 ATLAS
MEDIUM

langchain-text-splitters: SSRF bypass exposes cloud metadata

GHSA-fv5p-p927-qmxr
6.5
Data Extraction Auth Bypass Framework RAG
langchain-text-splitters Patch: 1.1.2 CWE-918 2.6K 3 ATLAS
HIGH

Paperclip: RCE via workspace runtime command injection

GHSA-w8hx-hqjv-vjcq
7.3
Code Execution Data Extraction Supply Chain Agent Plugin Framework
@paperclipai/server Patch: 2026.416.0 CWE-77 3.7K 8 ATLAS
HIGH

Flowise: auth bypass enables account takeover via null token

GHSA-f6hc-c5jr-878p
--
Auth Bypass Data Extraction Agent Framework
flowise Patch: 3.1.0 CWE-287 4 ATLAS
HIGH

Flowise: Cypher injection allows full Neo4j DB wipe

GHSA-28g4-38q8-3cwc
--
Data Extraction Code Execution Data Leakage Agent Framework Plugin
flowise-components Patch: 3.1.0 CWE-943 5 ATLAS
HIGH

Flowise: HTTP reset link exposes tokens to MITM takeover

GHSA-x5w6-38gp-mrqh
--
Auth Bypass Data Extraction Agent Framework
flowise Patch: 3.1.0 CWE-319 4 ATLAS
HIGH

Flowise: OAuth token theft via unauthenticated endpoint

GHSA-6f7g-v4pp-r667
--
Auth Bypass Data Extraction Privacy Violation Agent Framework API
flowise Patch: 3.1.0 CWE-306 6 ATLAS
HIGH

FlowiseAI: SSRF via prompt injection in API Chain

GHSA-6r77-hqx7-7vw8
7.1
Prompt Injection Data Extraction Agent Framework
flowise-components Patch: 3.1.0 CWE-918 5 ATLAS
HIGH

Flowise: SSRF bypass exposes internal services

GHSA-2x8m-83vc-6wv4
7.1
Auth Bypass Data Extraction Agent Framework Plugin
flowise-components Patch: 3.1.0 CWE-367 5 ATLAS
HIGH

Flowise: SSRF bypass exposes cloud IAM credentials

GHSA-xhmj-rg95-44hv
7.1
Auth Bypass Data Extraction Code Execution Agent Framework Plugin
flowise-components Patch: 3.1.0 CWE-284 5 ATLAS
HIGH

Flowise: MIME bypass enables persistent Node.js web shell RCE

GHSA-rh7v-6w34-w2rr
7.1
Code Execution Auth Bypass Agent Framework
flowise Patch: 3.1.0 CWE-434 5 ATLAS
HIGH

Flowise: unauthenticated RCE via FILE-STORAGE bypass

GHSA-cvrr-qhgw-2mm6
7.7
Code Execution Auth Bypass Data Extraction Agent Framework Plugin
flowise-components Patch: 3.1.0 CWE-20 6 ATLAS

Need deeper analysis?

Get ATLAS technique mappings, compliance reports (ISO 42001, EU AI Act), breaking alerts, and full CISO analysis with a Pro subscription.

Start 14-Day Free Trial