AI Security Threat Feed

Latest CVEs affecting AI/ML systems, updated continuously. Tracked from NVD, GitHub Advisory, and CISA KEV.

1,140

AI/ML CVEs Tracked

171

Critical

228

New This Week

2

In CISA KEV

Weekly CISO Take + top threats

Get the week's most critical AI security threats delivered every Monday. Free, no spam.

Latest AI Security Threats

Showing 50 of 167 results — has patch
HIGH CVE-2026-33497

Langflow is a tool for building and deploying AI-powered agents and workflows. Prior to version 1.7.1, in the download_profile_picture function of the /profile_pictures/{folder_name}/{file_name}...

Data Extraction Auth Bypass Framework Agent
CVSS 7.5 langflow Patch: 1.7.1 CWE-22
View details
CRITICAL CVE-2026-33309

Langflow is a tool for building and deploying AI-powered agents and workflows. Versions 1.2.0 through 1.8.1 have a bypass of the patch for CVE-2025-68478 (External Control of File Name), leading to...

Code Execution Auth Bypass Supply Chain Framework Agent Plugin
CVSS 9.9 langflow Patch: 1.9.0 CWE-22
View details
CRITICAL CVE-2025-15031

A vulnerability in MLflow's pyfunc extraction process allows for arbitrary file writes due to improper handling of tar archive entries. Specifically, the use of `tarfile.extractall` without path...

Supply Chain Model Poisoning Code Execution Framework Model Training Data
CVSS 9.1 EPSS 0.0% mlflow Patch: 3.9.0rc0 CWE-22
View details
HIGH CVE-2025-14287

A command injection vulnerability exists in mlflow/mlflow versions before v3.7.0, specifically in the `mlflow/sagemaker/__init__.py` file at lines 161-167. The vulnerability arises from the direct...

Supply Chain Model Poisoning Code Execution Framework Model
CVSS 7.5 EPSS 0.1% mlflow Patch: 3.8.0rc0 CWE-94
View details
MEDIUM GHSA-5cxw-w2xg-2m8h

fickling's `platform` module subprocess invocation evades `check_safety()` with `LIKELY_SAFE`

fickling Patch: 0.1.10 CWE-184
View details
MEDIUM GHSA-r48f-3986-4f9c

fickling modules linecache, difflib and gc are missing from the unsafe modules blocklist

fickling Patch: 0.1.10 CWE-184
View details
CRITICAL CVE-2026-27825

MCP Atlassian has an arbitrary file write leading to arbitrary code execution via unconstrained download_path in confluence_download_attachment

CVSS 9.1 EPSS 0.0% mcp-atlassian Patch: 0.17.0 CWE-22
View details
HIGH CVE-2026-27826

MCP Atlassian has SSRF via unvalidated X-Atlassian-Jira-Url / X-Atlassian-Confluence-Url headers

CVSS 8.2 EPSS 0.1% mcp-atlassian Patch: 0.17.0 CWE-918
View details
HIGH GHSA-5r2p-pjr8-7fh7

SageMaker Python SDK replaced eval() with safe parser in JumpStart search functionality

sagemaker Patch: 3.4.0 CWE-184
View details
MEDIUM CVE-2026-28277

LangGraph checkpoint loading has unsafe msgpack deserialization

CVSS 6.8 EPSS 0.0% langgraph Patch: 1.0.10 CWE-502
View details
HIGH CVE-2026-25048

xgrammar vulnerable to DoS via multi-layer nesting

EPSS 0.1% xgrammar Patch: 0.1.32 CWE-674
View details
HIGH GHSA-5hwf-rc88-82xm

Fickling missing RCE-capable modules in UNSAFE_IMPORTS

fickling Patch: 0.1.9 CWE-184
View details
HIGH GHSA-wccx-j62j-r448

Fickling has `always_check_safety()` bypass: pickle.loads and _pickle.loads remain unhooked

fickling Patch: 0.1.9 CWE-693
View details
CRITICAL GHSA-g38g-8gr9-h9xp

PickleScan has multiple stdlib modules with direct RCE not in blocklist

CVSS 9.8 picklescan Patch: 1.0.4 CWE-184
View details
CRITICAL GHSA-vvpj-8cmc-gx39

PickleScan's pkgutil.resolve_name has a universal blocklist bypass

CVSS 10.0 picklescan Patch: 1.0.4 CWE-183
View details
CRITICAL GHSA-7wx9-6375-f5wh

PickleScan's profile.run blocklist mismatch allows exec() bypass

CVSS 9.8 picklescan Patch: 1.0.4 CWE-184
View details
MEDIUM GHSA-mhc9-48gj-9gp3

Fickling has safety check bypass via REDUCE+BUILD opcode sequence

fickling Patch: 0.1.8 CWE-184
View details
HIGH GHSA-mxhj-88fx-4pcv

Fickling: OBJ opcode call invisibility bypasses all safety checks

fickling Patch: 0.1.8 CWE-436
View details
CRITICAL CVE-2026-2635

MLflow Use of Default Password Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of MLflow. Authentication is not...

Model Poisoning Code Execution Auth Bypass Framework RAG Model
CVSS 9.8 EPSS 0.7% mlflow Patch: 3.8.0rc0 CWE-1393
View details
HIGH CVE-2026-2033

MLflow Tracking Server Artifact Handler Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of...

Data Extraction Model Poisoning Code Execution Framework RAG Model
CVSS 8.1 EPSS 9.2% mlflow Patch: 3.8.0rc0 CWE-22
View details
MEDIUM CVE-2026-27482

Ray dashboard DELETE endpoints allow unauthenticated browser-triggered DoS (Serve shutdown / job deletion)

CVSS 5.9 EPSS 0.0% ray Patch: 2.54.0 CWE-306
View details
LOW GHSA-83pf-v6qq-pwmr

Fickling has a detection bypass via stdlib network-protocol constructors

fickling Patch: 0.1.8 CWE-184
View details
CRITICAL CVE-2026-26030

Microsoft Semantic Kernel InMemoryVectorStore filter functionality vulnerable to remote code execution

CVSS 10.0 EPSS 0.1% semantic-kernel Patch: 1.39.4 CWE-94
View details
HIGH GHSA-97f8-7cmv-76j2

Picklescan (scan_pytorch) Bypass via dynamic eval MAGIC_NUMBER

picklescan Patch: 1.0.3 CWE-184
View details
CRITICAL CVE-2026-25592

Semantic Kernel is an SDK used to build, orchestrate, and deploy AI agents and multi-agent systems. Prior to 1.71.0, an Arbitrary File Write vulnerability has been identified in Microsoft's Semantic...

CVSS 9.9 EPSS 0.1% semantic-kernel Patch: 1.39.3 CWE-22
View details
HIGH CVE-2026-25580

Pydantic AI is a Python agent framework for building applications and workflows with Generative AI. From 0.0.26 to before 1.56.0, aServer-Side Request Forgery (SSRF) vulnerability exists in Pydantic...

CVSS 8.6 EPSS 0.0% pydantic-ai Patch: 1.56.0 CWE-918
View details
MEDIUM CVE-2026-25640

Pydantic AI is a Python agent framework for building applications and workflows with Generative AI. From 1.34.0 to before 1.51.0, a path traversal vulnerability in the Pydantic AI web UI allows an...

CVSS 5.4 EPSS 0.0% pydantic-ai Patch: 1.51.0 CWE-22
View details
HIGH CVE-2026-1777

SageMaker Python SDK has Exposed HMAC

CVSS 7.2 EPSS 0.0% sagemaker Patch: 3.2.0 CWE-201
View details
MEDIUM CVE-2026-1778

SageMaker Python SDK has Insecure TLS Configuration

CVSS 5.9 EPSS 0.0% sagemaker Patch: 3.1.1 CWE-295
View details
MEDIUM GHSA-m7j5-r2p5-c39r

picklescan vulnerable to arbitrary file create using logging.FileHandler

picklescan Patch: 1.0.1 CWE-502
View details
HIGH GHSA-9m3x-qqw2-h32h

picklescan missing detection by simple obfuscation of a `builtins.eval` call

picklescan Patch: 1.0.1 CWE-502
View details
HIGH CVE-2026-1117

Lollms has an Improper Access Control vulnerability

CVSS 8.2 EPSS 0.1% lollms Patch: 2.1.0 CWE-284
View details
MEDIUM CVE-2025-6208

llama-index-core vulnerable to Uncontrolled Resource Consumption

CVSS 5.3 EPSS 0.0% llama-index-core Patch: 0.12.41 CWE-400
View details
HIGH CVE-2025-10279

In mlflow version 2.20.3, the temporary directory used for creating Python virtual environments is assigned insecure world-writable permissions (0o777). This vulnerability allows an attacker with...

CVSS 7.0 EPSS 0.0% mlflow Patch: 3.4.0rc0 CWE-379
View details
HIGH CVE-2026-22219

Chainlit contain a server-side request forgery (SSRF) vulnerability

CVSS 7.7 EPSS 0.0% chainlit Patch: 2.9.4 CWE-918
View details
HIGH CVE-2026-0897

Google Keras Allocates Resources Without Limits or Throttling in the HDF5 weight loading component

EPSS 0.0% keras Patch: 3.12.1 CWE-770
View details
MEDIUM CVE-2025-68492

Chainlit contains an authorization bypass vulnerability

CVSS 4.2 EPSS 0.0% chainlit Patch: 2.8.5 CWE-639
View details
HIGH CVE-2025-14279

MLFlow versions up to and including 3.4.0 are vulnerable to DNS rebinding attacks due to a lack of Origin header validation in the MLFlow REST server. This vulnerability allows malicious websites to...

CVSS 8.1 EPSS 0.0% mlflow Patch: 3.5.0 CWE-346
View details
HIGH CVE-2026-22612

Fickling vulnerable to detection bypass due to "builtins" blindness

EPSS 0.1% fickling Patch: 0.1.7 CWE-502
View details
HIGH CVE-2026-22609

Fickling has Static Analysis Bypass via Incomplete Dangerous Module Blocklist

EPSS 0.1% fickling Patch: 0.1.7 CWE-184
View details
HIGH CVE-2026-22608

Fickling vulnerable to use of ctypes and pydoc gadget chain to bypass detection

EPSS 0.0% fickling Patch: 0.1.7 CWE-184
View details
HIGH CVE-2026-22607

Fickling Blocklist Bypass: cProfile.run()

EPSS 0.1% fickling Patch: 0.1.7 CWE-184
View details
HIGH CVE-2026-22606

Fickling has a bypass via runpy.run_path() and runpy.run_module()

EPSS 0.1% fickling Patch: 0.1.7 CWE-184
View details
HIGH GHSA-mcmc-2m55-j8jj

vLLM introduced enhanced protection for CVE-2025-62164

CVSS 8.8 vllm Patch: 0.13.0 CWE-20
View details
HIGH GHSA-9726-w42j-3qjr

picklescan has Arbitrary file read using `io.FileIO`

picklescan Patch: 0.0.35 CWE-22
View details
MEDIUM CVE-2026-21851

MONAI has Path Traversal (Zip Slip) in NGC Private Bundle Download

CVSS 5.3 EPSS 0.0% monai Patch: 1.5.2 CWE-22
View details
HIGH GHSA-46h3-79wf-xr6c

Picklescan is vulnerable to RCE via missing detection when calling built-in python _operator.attrgetter

picklescan Patch: 0.0.34 CWE-94
View details
HIGH GHSA-955r-x9j8-7rhh

Picklescan is vulnerable to RCE via missing detection when calling built-in python _operator.methodcaller

picklescan Patch: 0.0.34 CWE-94
View details
MEDIUM GHSA-6556-fwc2-fg2p

Picklescan is vulnerable to RCE through missing detection when calling numpy.f2py.crackfortran._eval_length

picklescan Patch: 0.0.33 CWE-94
View details
HIGH GHSA-rrxm-2pvv-m66x

Picklescan is vulnerable to RCE via missing detection when calling numpy.f2py.crackfortran.getlincoef

picklescan Patch: 0.0.33 CWE-94
View details

Need deeper analysis?

Get ATLAS technique mappings, compliance reports (ISO 42001, EU AI Act), breaking alerts, and full CISO analysis with a Pro subscription.

Start 14-Day Free Trial