AI Security Threat Feed

Latest CVEs affecting AI/ML systems, updated continuously. Tracked from NVD, GitHub Advisory, and CISA KEV.

1,604

AI/ML CVEs Tracked

225

Critical

79

New This Week

16

In CISA KEV

Latest AI Security Threats

Showing 20 of 58 results — Critical severity, has patch
CRITICAL

open-webui: LDAP auth bypass — full account takeover

CVE-2026-44551
9.1
Auth Bypass Data Extraction Framework API
open-webui Patch: 0.9.0 CWE-287 4 ATLAS
CRITICAL

vm2: sandbox escape via nesting:true enables RCE

CVE-2026-44007
9.1
Code Execution Auth Bypass Agent Framework
vm2 Patch: 3.11.1 CWE-284 1.4K 5 ATLAS
CRITICAL

Langflow: path traversal allows arbitrary directory deletion

CVE-2026-42048
9.6
DoS Auth Bypass Framework RAG
langflow Patch: 1.9.0 CWE-22 3 ATLAS
CRITICAL

LiteLLM has SQL Injection in Proxy API key verification

GHSA-r75f-5x8p-qvmc
--
litellm Patch: 1.83.7 CWE-89 4
CRITICAL EXPLOIT AVAIL

Flowise: CSV Agent Prompt Injection Remote Code Execution Vulnerability

CVE-2026-41264
9.8
EPSS 0.3%
flowise-components Patch: 3.1.0 CWE-184
CRITICAL

Flowise: Airtable_Agent Code Injection Remote Code Execution Vulnerability

GHSA-v38x-c887-992f
--
flowise-components Patch: 3.1.0 CWE-184
CRITICAL

OpenClaw: Feishu webhook and card-action validation now fail closed

GHSA-xh72-v6v9-mwhc
--
openclaw Patch: 2026.4.15 CWE-287 4
CRITICAL

Incomplete fix for CVE-2026-34935: Command Injection in MervinPraison/PraisonAI

GHSA-9qhq-v63v-fv3j
9.8
praisonai Patch: 4.5.149 CWE-78 1
CRITICAL

Flowise CSVAgent: RCE via Python code injection

GHSA-9wc7-mj3f-74xv
--
Code Execution Auth Bypass Agent Framework
flowise-components Patch: 3.1.0 CWE-94 5 ATLAS
CRITICAL EXPLOIT AVAIL

Flowise: RCE via MCP stdio command injection

CVE-2026-40933
9.9
EPSS 0.0%
Code Execution Supply Chain Auth Bypass Agent Plugin Framework
flowise-components Patch: 3.1.0 CWE-78 7 ATLAS
CRITICAL

PraisonAI: auth bypass enables browser session hijack

GHSA-8x8f-54wf-vv92
9.1
Auth Bypass Data Extraction Code Execution Agent Plugin
PraisonAI Patch: 4.5.139 CWE-306 1 5 ATLAS
CRITICAL

PraisonAI: RCE via malicious workflow YAML execution

GHSA-vc46-vw85-3wvm
9.8
Code Execution Supply Chain Agent Framework
PraisonAI Patch: 4.5.139 CWE-78 1 6 ATLAS
CRITICAL EXPLOIT AVAIL

PraisonAI: path traversal allows arbitrary file write via recipe unpack

CVE-2026-40157
--
EPSS 0.1%
Supply Chain Code Execution Agent Framework
PraisonAI Patch: 4.5.128 CWE-22 1 3 ATLAS
CRITICAL EXPLOIT AVAIL

PraisonAI: supply chain RCE via unverified template exec

CVE-2026-40154
9.3
EPSS 0.0%
Supply Chain Code Execution Agent Plugin Framework
PraisonAI Patch: 4.5.128 CWE-829 1 7 ATLAS
CRITICAL EXPLOIT AVAIL

lollms: Stored XSS enables wormable account takeover

CVE-2026-1115
9.6
EPSS 0.0%
Code Execution Auth Bypass Data Extraction Framework API
lollms Patch: 2.2.0 CWE-79 5 ATLAS
CRITICAL EXPLOIT AVAIL

PraisonAI: RCE via shell injection in memory hooks executor

CVE-2026-40111
--
EPSS 0.0%
Code Execution Prompt Injection Agent Framework
praisonaiagents Patch: 1.5.128 CWE-78 11 5 ATLAS
CRITICAL

PraisonAI: RCE via shell injection in agent workflows

GHSA-2763-cj5r-c79m
9.7
Code Execution Prompt Injection Supply Chain Agent Framework
PraisonAI Patch: 4.5.121 CWE-78 1 6 ATLAS
CRITICAL

Marimo: pre-auth RCE via terminal WebSocket

GHSA-2679-6mx9-h9xc
--
Auth Bypass Code Execution Framework
marimo Patch: 0.23.0 CWE-306 2.9K 5 ATLAS
CRITICAL

praisonaiagents: sandbox escape enables host RCE

CVE-2026-39888
10.0
EPSS 0.1%
Code Execution Auth Bypass Agent Framework
praisonaiagents Patch: 1.5.115 CWE-657 11 5 ATLAS
CRITICAL EXPLOIT AVAIL

PraisonAI: YAML deserialization enables unauthenticated RCE

CVE-2026-39890
9.8
EPSS 0.5%
Code Execution Supply Chain Agent Framework
praisonai Patch: 4.5.115 CWE-502 1 5 ATLAS

Need deeper analysis?

Get ATLAS technique mappings, compliance reports (ISO 42001, EU AI Act), breaking alerts, and full CISO analysis with a Pro subscription.

Start 14-Day Free Trial