AI Security Threat Feed

Latest CVEs affecting AI/ML systems, updated continuously. Tracked from NVD, GitHub Advisory, and CISA KEV.

1,604

AI/ML CVEs Tracked

225

Critical

77

New This Week

16

In CISA KEV

Latest AI Security Threats

Showing 20 of 199 results — High severity, has patch
HIGH

LangChain: deserialization poisons LLM chat history

CVE-2026-44843
8.2
Prompt Injection Code Execution Supply Chain Framework Agent
langchain-core Patch: 1.3.3 CWE-502 4.4K 5 ATLAS
HIGH

Open WebUI: path traversal + file upload leads to RCE

CVE-2026-44566
7.3
Code Execution Supply Chain Inference Model
open-webui Patch: 0.1.124 CWE-22 5 ATLAS
HIGH

Open WebUI: auth bypass gives pending users full LLM access

CVE-2026-44567
7.3
Auth Bypass Data Extraction DoS API Inference
open-webui Patch: 0.1.124 CWE-862 4 ATLAS
HIGH

open-webui: XSS via XLSX preview enables session hijack

CVE-2026-44549
7.3
Code Execution Data Extraction Auth Bypass Framework API
open-webui Patch: 0.8.0 CWE-79 7 ATLAS
HIGH

banks: SSTI enables RCE via unsandboxed Jinja2 templates

CVE-2026-44209
7.5
Code Execution Supply Chain Framework Agent
banks Patch: 2.4.2 CWE-1336 143 4 ATLAS
HIGH

open-webui: RAG poisoning via unauthorized KB overwrite

CVE-2026-44554
8.1
Auth Bypass Model Poisoning Prompt Injection RAG API Framework
open-webui Patch: 0.9.0 CWE-862 8 ATLAS
HIGH

open-webui: auth bypass allows unrestricted model access

CVE-2026-44556
7.1
Auth Bypass DoS Data Extraction API Inference Model
open-webui Patch: 0.9.0 CWE-284 8 ATLAS
HIGH

open-webui: access control bypass via model chaining

CVE-2026-44555
7.6
Auth Bypass API Model Inference
open-webui Patch: 0.9.0 CWE-862 4 ATLAS
HIGH

open-webui: Redis cache poisoning enables cross-instance tool hijack

CVE-2026-44552
8.7
Supply Chain Data Extraction Prompt Injection Agent Plugin Framework
open-webui Patch: 0.9.0 CWE-668 6 ATLAS
HIGH

open-webui: stale Socket.IO role allows cross-user note R/W

CVE-2026-44553
8.1
Auth Bypass Data Extraction Privacy Violation API Framework
open-webui Patch: 0.9.0 CWE-384 5 ATLAS
HIGH

open-webui: XSS in model descriptions steals session tokens

CVE-2026-44721
7.3
Auth Bypass Code Execution Data Extraction API Framework
open-webui Patch: 0.9.0 CWE-79 5 ATLAS
HIGH

n8n-mcp: path traversal + SSRF exposes n8n API keys

GHSA-8g7g-hmwm-6rv2
8.3
Auth Bypass Data Extraction Data Leakage Agent Plugin
n8n-mcp Patch: 2.50.1 CWE-22 16 6 ATLAS
HIGH

diffusers: trust_remote_code bypass enables silent RCE

CVE-2026-44513
8.8
Supply Chain Code Execution Framework Model
diffusers Patch: 0.38.0 CWE-94 392 4 ATLAS
HIGH

diffusers: silent RCE via None.py trust_remote_code bypass

GHSA-j7w6-vpvq-j3gm
8.8
Code Execution Supply Chain Framework Model
diffusers Patch: 0.38.0 CWE-94 392 6 ATLAS
HIGH

Aegra: cross-tenant IDOR hijacks user thread data

CVE-2026-44504
--
Auth Bypass Data Extraction Data Leakage Framework Agent
aegra-api Patch: 0.9.7 CWE-285 3.1K 5 ATLAS
HIGH

praisonai: RCE via unpatched tool_override exec_module

CVE-2026-44334
8.4
EPSS 0.0%
Code Execution Auth Bypass Supply Chain Agent Framework Plugin
praisonai Patch: 4.6.32 CWE-94 1 5 ATLAS
HIGH

praisonaiagents: SSRF via URL parser confusion bypass

CVE-2026-44335
--
EPSS 0.0%
Auth Bypass Data Extraction Agent Plugin
praisonaiagents Patch: 1.6.32 CWE-918 11 4 ATLAS
HIGH

GitPython: git config injection enables hook RCE

CVE-2026-44244
7.8
EPSS 0.0%
Supply Chain Code Execution Framework
GitPython Patch: 3.1.49 CWE-94 81 3 ATLAS
HIGH

JupyterLab: one-click RCE via notebook HTML cell output

CVE-2026-42557
--
Code Execution Social Engineering Supply Chain Framework Plugin
notebook Patch: 7.5.6 CWE-79 2.9K 8 ATLAS
HIGH

mistune: ReDoS exposes Jupyter/AI services to DoS

CVE-2026-33079
--
EPSS 0.0%
DoS Supply Chain Framework API
mistune Patch: 3.2.1 CWE-1333 1.9K 4 ATLAS

Need deeper analysis?

Get ATLAS technique mappings, compliance reports (ISO 42001, EU AI Act), breaking alerts, and full CISO analysis with a Pro subscription.

Start 14-Day Free Trial