AI Security Threat Feed

Latest CVEs affecting AI/ML systems, updated continuously. Tracked from NVD, GitHub Advisory, and CISA KEV.

1,604

AI/ML CVEs Tracked

225

Critical

76

New This Week

16

In CISA KEV

Latest AI Security Threats

Showing 20 of 684 results — High severity
HIGH

fickling: Allowlist Bypass evades input filtering

GHSA-5hwf-rc88-82xm
--
Supply Chain Code Execution Framework Model
fickling Patch: 0.1.9 CWE-184 57 5 ATLAS
HIGH

fickling: Protection Bypass circumvents security controls

GHSA-wccx-j62j-r448
--
Code Execution Supply Chain Auth Bypass Framework Model Inference
fickling Patch: 0.1.9 CWE-693 57 5 ATLAS
HIGH

A vulnerability in NLTK versions up to and including 3.9.2 allows arbitrary file read via path traversal in multiple CorpusReader classes, including...

CVE-2026-0847
8.6
EPSS 0.1%
CWE-22
HIGH EXPLOIT AVAIL

bentoml: security flaw enables exploitation

CVE-2026-27905
7.8
EPSS 0.0%
Code Execution Framework Agent Model
bentoml CWE-59 23 6 ATLAS
HIGH EXPLOIT AVAIL

gradio: SSRF allows internal network access

CVE-2026-28416
8.6
EPSS 0.0%
Data Extraction Code Execution Framework Model Training Data
gradio CWE-918 679 9 ATLAS
HIGH EXPLOIT AVAIL SCANNER

gradio: security flaw enables exploitation

CVE-2026-28414
7.5
EPSS 3.2%
Code Execution Data Extraction Framework API Model
gradio CWE-36 679 9 ATLAS
HIGH

n8n: Code Injection enables RCE

CVE-2026-27498
8.8
EPSS 0.6%
Model Poisoning Code Execution Agent RAG API
n8n CWE-94 16 10 ATLAS
HIGH

n8n: SQL Injection exposes database

CVE-2026-27497
8.8
EPSS 0.1%
Model Poisoning Code Execution Agent RAG API
n8n CWE-89 16 9 ATLAS
HIGH

fickling: security flaw enables exploitation

GHSA-mxhj-88fx-4pcv
--
Supply Chain Code Execution Auth Bypass Framework Model
fickling Patch: 0.1.8 CWE-436 57 6 ATLAS
HIGH

mlflow: Path Traversal enables file access

CVE-2026-2033
8.1
EPSS 14.7%
Data Extraction Model Poisoning Code Execution Framework RAG Model
mlflow Patch: 3.8.0rc0 CWE-22 624 11 ATLAS
HIGH

google-cloud-aiplatform: XSS enables session hijacking

CVE-2026-2472
--
EPSS 0.1%
Code Execution Data Extraction Supply Chain Framework API
CWE-79 8 ATLAS
HIGH

OpenClaw: prompt injection via unsanitized workspace path

CVE-2026-27001
7.8
EPSS 0.0%
Prompt Injection Data Extraction Code Execution Agent
openclaw CWE-77 4 5 ATLAS 1 incident
HIGH

OpenClaw: path traversal enables local file exfiltration

CVE-2026-26321
7.5
EPSS 0.0%
Data Extraction Prompt Injection Privacy Violation Agent Plugin
openclaw CWE-22 4 5 ATLAS 1 incident
HIGH EXPLOIT AVAIL

sillytavern: SSRF allows internal network access

CVE-2026-26286
8.5
EPSS 0.0%
Data Extraction Code Execution Social Engineering Framework RAG Agent
CWE-918 9 ATLAS
HIGH

picklescan: Allowlist Bypass evades input filtering

GHSA-97f8-7cmv-76j2
--
Code Execution Supply Chain Model Framework
picklescan Patch: 1.0.3 CWE-184 3 7 ATLAS
HIGH

keras: File Control enables path manipulation

CVE-2026-1669
7.5
EPSS 0.0%
Data Extraction Code Execution Framework RAG API
keras CWE-73 1.5K 8 ATLAS
HIGH EXPLOIT AVAIL

pydantic-ai: SSRF allows internal network access

CVE-2026-25580
8.6
EPSS 0.0%
Data Extraction Auth Bypass Framework Agent API
pydantic-ai-slim Patch: 1.56.0 CWE-918 416 6 ATLAS
HIGH

n8n: Input Validation flaw enables exploitation

CVE-2026-21893
7.2
EPSS 0.2%
Code Execution Social Engineering Agent RAG API
n8n CWE-20 16 10 ATLAS
HIGH

n8n: Arbitrary File Upload enables RCE

CVE-2026-25056
8.8
EPSS 0.2%
Code Execution Auth Bypass Data Extraction Agent Framework Plugin
n8n CWE-434 16 8 ATLAS
HIGH

n8n: Path Traversal enables file access

CVE-2026-25055
8.1
EPSS 0.2%
Code Execution Auth Bypass Agent Framework
n8n CWE-22 16 7 ATLAS

Need deeper analysis?

Get ATLAS technique mappings, compliance reports (ISO 42001, EU AI Act), breaking alerts, and full CISO analysis with a Pro subscription.

Start 14-Day Free Trial