AI Security Threat Feed
Latest CVEs affecting AI/ML systems, updated continuously. Tracked from NVD, GitHub Advisory, and CISA KEV.
AI/ML CVEs Tracked
Critical
New This Week
In CISA KEV
Latest AI Security Threats
Showing 20 of 512 results — has patchmistune: XSS via unescaped heading id= attribute
CVE-2026-44897 LangChain: deserialization poisons LLM chat history
CVE-2026-44843 Open WebUI: path traversal + file upload leads to RCE
CVE-2026-44566 Open WebUI: auth bypass gives pending users full LLM access
CVE-2026-44567 open-webui: XSS via XLSX preview enables session hijack
CVE-2026-44549 open-webui: XSS in pending overlay enables session hijack
CVE-2026-44568 banks: SSTI enables RCE via unsandboxed Jinja2 templates
CVE-2026-44209 open-webui: RAG auth bypass exposes private files
CVE-2026-44560 open-webui: auth bypass exposes private group channels
CVE-2026-44561 open-webui: auth bypass in collaborative doc editing
CVE-2026-44564 open-webui: auth bypass exposes restricted LLM models
CVE-2026-44563 open-webui: missing authz enables model hijacking
CVE-2026-44562 open-webui: private channel member list exposed to any user
CVE-2026-44559 open-webui: auth bypass exposes all knowledge base metadata
CVE-2026-44557 open-webui: RAG poisoning via unauthorized KB overwrite
CVE-2026-44554 open-webui: permission bypass exposes channels publicly
CVE-2026-44558 open-webui: auth bypass allows unrestricted model access
CVE-2026-44556 Open WebUI's Base Model Routing Bypasses Access Control via Model Chaining
CVE-2026-44555 Open WebUI: Redis Cache Keys tool_servers and terminal_servers Missing Instance Prefix Enable Cross-Instance Cache Poisoning
CVE-2026-44552 Open WebUI: Stale Admin Role in Socket.IO Session Pool Enables Post-Demotion Cross-User Note Access
CVE-2026-44553 Need deeper analysis?
Get ATLAS technique mappings, compliance reports (ISO 42001, EU AI Act), breaking alerts, and full CISO analysis with a Pro subscription.
Start 14-Day Free Trial
AI Threat Alert