AI Security Threat Feed
Latest CVEs affecting AI/ML systems, updated continuously. Tracked from NVD, GitHub Advisory, and CISA KEV.
AI/ML CVEs Tracked
Critical
New This Week
In CISA KEV
Weekly CISO Take + top threats
Get the week's most critical AI security threats delivered every Monday. Free, no spam.
Latest AI Security Threats
Showing 50 of 74 results — High severity, has patch CVE-2026-33497 Langflow is a tool for building and deploying AI-powered agents and workflows. Prior to version 1.7.1, in the download_profile_picture function of the /profile_pictures/{folder_name}/{file_name}...
CVE-2025-14287 A command injection vulnerability exists in mlflow/mlflow versions before v3.7.0, specifically in the `mlflow/sagemaker/__init__.py` file at lines 161-167. The vulnerability arises from the direct...
CVE-2026-27826 MCP Atlassian has SSRF via unvalidated X-Atlassian-Jira-Url / X-Atlassian-Confluence-Url headers
GHSA-5r2p-pjr8-7fh7 SageMaker Python SDK replaced eval() with safe parser in JumpStart search functionality
CVE-2026-25048 xgrammar vulnerable to DoS via multi-layer nesting
GHSA-5hwf-rc88-82xm Fickling missing RCE-capable modules in UNSAFE_IMPORTS
GHSA-wccx-j62j-r448 Fickling has `always_check_safety()` bypass: pickle.loads and _pickle.loads remain unhooked
GHSA-mxhj-88fx-4pcv Fickling: OBJ opcode call invisibility bypasses all safety checks
CVE-2026-2033 MLflow Tracking Server Artifact Handler Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of...
GHSA-97f8-7cmv-76j2 Picklescan (scan_pytorch) Bypass via dynamic eval MAGIC_NUMBER
CVE-2026-25580 Pydantic AI is a Python agent framework for building applications and workflows with Generative AI. From 0.0.26 to before 1.56.0, aServer-Side Request Forgery (SSRF) vulnerability exists in Pydantic...
CVE-2026-1777 SageMaker Python SDK has Exposed HMAC
GHSA-9m3x-qqw2-h32h picklescan missing detection by simple obfuscation of a `builtins.eval` call
CVE-2026-1117 Lollms has an Improper Access Control vulnerability
CVE-2025-10279 In mlflow version 2.20.3, the temporary directory used for creating Python virtual environments is assigned insecure world-writable permissions (0o777). This vulnerability allows an attacker with...
CVE-2026-22219 Chainlit contain a server-side request forgery (SSRF) vulnerability
CVE-2026-0897 Google Keras Allocates Resources Without Limits or Throttling in the HDF5 weight loading component
CVE-2025-14279 MLFlow versions up to and including 3.4.0 are vulnerable to DNS rebinding attacks due to a lack of Origin header validation in the MLFlow REST server. This vulnerability allows malicious websites to...
CVE-2026-22612 Fickling vulnerable to detection bypass due to "builtins" blindness
CVE-2026-22609 Fickling has Static Analysis Bypass via Incomplete Dangerous Module Blocklist
CVE-2026-22608 Fickling vulnerable to use of ctypes and pydoc gadget chain to bypass detection
CVE-2026-22607 Fickling Blocklist Bypass: cProfile.run()
CVE-2026-22606 Fickling has a bypass via runpy.run_path() and runpy.run_module()
GHSA-mcmc-2m55-j8jj vLLM introduced enhanced protection for CVE-2025-62164
GHSA-9726-w42j-3qjr picklescan has Arbitrary file read using `io.FileIO`
GHSA-46h3-79wf-xr6c Picklescan is vulnerable to RCE via missing detection when calling built-in python _operator.attrgetter
GHSA-955r-x9j8-7rhh Picklescan is vulnerable to RCE via missing detection when calling built-in python _operator.methodcaller
GHSA-rrxm-2pvv-m66x Picklescan is vulnerable to RCE via missing detection when calling numpy.f2py.crackfortran.getlincoef
GHSA-3329-ghmp-jmv5 Picklescan is vulnerable to RCE through missing detection when calling numpy.f2py.crackfortran.myeval
GHSA-x843-g5mx-g377 Picklescan is vulnerable to RCE through missing detection when calling built-in python operator.methodcaller
GHSA-r8g5-cgf2-4m4m Picklescan missing detection when calling numpy.f2py.crackfortran.getlincoef
GHSA-hgrh-qx5j-jfwx Picklescan Bypasses Unsafe Globals Check using pty.spawn
GHSA-vqmv-47xg-9wpr Picklescan missing detection when calling pty.spawn
GHSA-84r2-jw7c-4r5q Picklescan has Incomplete List of Disallowed Inputs
GHSA-4675-36f9-wf6r Picklescan does not block ctypes
GHSA-m273-6v24-x4m4 Picklescan vulnerable to Arbitrary File Writing
CVE-2025-67748 Fickling has Code Injection vulnerability via pty.spawn()
CVE-2025-67747 Fickling has missing detection for marshal.loads and types.FunctionType in unsafe modules list
CVE-2025-65958 Open WebUI vulnerable to Server-Side Request Forgery (SSRF) via Arbitrary URL Processing in /api/v1/retrieval/process/web
CVE-2025-65106 LangChain is a framework for building agents and LLM-powered applications. From versions 0.3.79 and prior and 1.0.0 to 1.0.6, a template injection vulnerability exists in LangChain's prompt template...
CVE-2025-64496 Open WebUI Affected by an External Model Server (Direct Connections) Code Injection via SSE Events
CVE-2025-64495 Open WebUI vulnerable to Stored DOM XSS via prompts when 'Insert Prompt as Rich Text' is enabled resulting in ATO/RCE
CVE-2025-7707 llama-index has Insecure Temporary File
CVE-2025-6242 A Server-Side Request Forgery (SSRF) vulnerability exists in the MediaConnector class within the vLLM project's multimodal feature set. The load_from_url and load_from_url_async methods fetch and...
CVE-2025-61784 LLaMA-Factory is a tuning library for large language models. Prior to version 0.9.4, a Server-Side Request Forgery (SSRF) vulnerability in the chat API allows any authenticated user to force the...
CVE-2025-7647 llama-index-core insecurely handles temporary files
CVE-2025-10156 Picklescan: ZIP archive scan bypass is possible through non-exhaustive Cyclic Redundancy Check
CVE-2025-10157 Picklescan is Vulnerable to Unsafe Globals Check Bypass through Subclass Imports
CVE-2025-58757 Monai: Unsafe use of Pickle deserialization may lead to RCE
CVE-2025-58756 MONAI: Unsafe torch usage may lead to arbitrary code execution
Need deeper analysis?
Get ATLAS technique mappings, compliance reports (ISO 42001, EU AI Act), breaking alerts, and full CISO analysis with a Pro subscription.
Start 14-Day Free Trial