AI Security Threat Feed

Latest CVEs affecting AI/ML systems, updated continuously. Tracked from NVD, GitHub Advisory, and CISA KEV.

1,140

AI/ML CVEs Tracked

171

Critical

228

New This Week

2

In CISA KEV

Weekly CISO Take + top threats

Get the week's most critical AI security threats delivered every Monday. Free, no spam.

Latest AI Security Threats

Showing 50 of 171 results — Critical severity
CRITICAL CVE-2025-33244

NVIDIA APEX for Linux contains a vulnerability where an unauthorized attacker could cause a deserialization of untrusted data. This vulnerability affects environments that use PyTorch versions...

Code Execution Supply Chain Data Extraction Framework Training Data
CVSS 9.0 CWE-502
View details
CRITICAL CVE-2026-33475

Langflow is a tool for building and deploying AI-powered agents and workflows. An unauthenticated remote shell injection vulnerability exists in multiple GitHub Actions workflows in the Langflow...

Supply Chain Code Execution Data Extraction Framework Agent
CVSS 9.1 langflow CWE-74
View details
CRITICAL CVE-2026-33309

Langflow is a tool for building and deploying AI-powered agents and workflows. Versions 1.2.0 through 1.8.1 have a bypass of the patch for CVE-2025-68478 (External Control of File Name), leading to...

Code Execution Auth Bypass Supply Chain Framework Agent Plugin
CVSS 9.9 langflow Patch: 1.9.0 CWE-22
View details
CRITICAL CVE-2026-33017

Langflow is a tool for building and deploying AI-powered agents and workflows. In versions prior to 1.9.0, the POST /api/v1/build_public_tmp/{flow_id}/flow endpoint allows building public flows...

Model Poisoning Code Execution Framework Agent API
CVSS 9.8 EPSS 0.5% langflow CWE-95
View details
CRITICAL CVE-2025-15031

A vulnerability in MLflow's pyfunc extraction process allows for arbitrary file writes due to improper handling of tar archive entries. Specifically, the use of `tarfile.extractall` without path...

Supply Chain Model Poisoning Code Execution Framework Model Training Data
CVSS 9.1 EPSS 0.0% mlflow Patch: 3.9.0rc0 CWE-22
View details
CRITICAL CVE-2026-28500

Open Neural Network Exchange (ONNX) is an open standard for machine learning interoperability. In versions up to and including 1.20.1, a security control bypass exists in onnx.hub.load() due to...

Supply Chain Model Poisoning Code Execution Framework RAG API
CVSS 9.1 EPSS 0.0% onnx CWE-345
View details
CRITICAL CVE-2026-27825

MCP Atlassian has an arbitrary file write leading to arbitrary code execution via unconstrained download_path in confluence_download_attachment

CVSS 9.1 EPSS 0.0% mcp-atlassian Patch: 0.17.0 CWE-22
View details
CRITICAL CVE-2026-25960

vLLM is an inference and serving engine for large language models (LLMs). The SSRF protection fix for CVE-2026-24779 add in 0.15.1 can be bypassed in the load_from_url_async method due to...

Data Extraction Data Leakage Code Execution Inference RAG Agent
CVSS 9.8 EPSS 0.0% vllm CWE-918
View details
CRITICAL CVE-2026-30821

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to version 3.0.13, the /api/v1/attachments/:chatflowId/:chatId endpoint is listed in WHITELIST_URLS,...

Code Execution Framework RAG Plugin
CVSS 9.8 CWE-434
View details
CRITICAL GHSA-g38g-8gr9-h9xp

PickleScan has multiple stdlib modules with direct RCE not in blocklist

CVSS 9.8 picklescan Patch: 1.0.4 CWE-184
View details
CRITICAL GHSA-vvpj-8cmc-gx39

PickleScan's pkgutil.resolve_name has a universal blocklist bypass

CVSS 10.0 picklescan Patch: 1.0.4 CWE-183
View details
CRITICAL GHSA-7wx9-6375-f5wh

PickleScan's profile.run blocklist mismatch allows exec() bypass

CVSS 9.8 picklescan Patch: 1.0.4 CWE-184
View details
CRITICAL CVE-2026-27966

Langflow is a tool for building and deploying AI-powered agents and workflows. Prior to version 1.8.0, the CSV Agent node in Langflow hardcodes `allow_dangerous_code=True`, which automatically...

Prompt Injection Code Execution Framework RAG Agent
CVSS 9.8 EPSS 0.2% langflow CWE-94
View details
CRITICAL CVE-2026-27577

n8n is an open source workflow automation platform. Prior to versions 2.10.1, 2.9.3, and 1.123.22, additional exploits in the expression evaluation of n8n have been identified and patched following...

Model Poisoning Code Execution Social Engineering Agent RAG API
CVSS 9.9 n8n CWE-94
View details
CRITICAL CVE-2026-27495

n8n is an open source workflow automation platform. Prior to versions 2.10.1, 2.9.3, and 1.123.22, an authenticated user with permission to create or modify workflows could exploit a vulnerability in...

Code Execution Social Engineering Agent RAG API
CVSS 9.9 n8n CWE-94
View details
CRITICAL CVE-2026-27494

n8n is an open source workflow automation platform. Prior to versions 2.10.1, 2.9.3, and 1.123.22, an authenticated user with permission to create or modify workflows could use the Python Code node...

Code Execution Agent RAG API
CVSS 9.9 n8n CWE-497
View details
CRITICAL CVE-2026-27493

n8n is an open source workflow automation platform. Prior to versions 2.10.1, 2.9.3, and 1.123.22, a second-order expression injection vulnerability existed in n8n's Form nodes that could allow an...

Code Execution Agent RAG API
CVSS 9.0 n8n CWE-94
View details
CRITICAL CVE-2026-2635

MLflow Use of Default Password Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of MLflow. Authentication is not...

Model Poisoning Code Execution Auth Bypass Framework RAG Model
CVSS 9.8 EPSS 0.7% mlflow Patch: 3.8.0rc0 CWE-1393
View details
CRITICAL CVE-2026-26030

Microsoft Semantic Kernel InMemoryVectorStore filter functionality vulnerable to remote code execution

CVSS 10.0 EPSS 0.1% semantic-kernel Patch: 1.39.4 CWE-94
View details
CRITICAL CVE-2026-2654

A weakness has been identified in huggingface smolagents 1.24.0. Impacted is the function requests.get/requests.post of the component LocalPythonExecutor. Executing a manipulation can lead to...

CVSS 9.8 smolagents
View details
CRITICAL CVE-2026-25592

Semantic Kernel is an SDK used to build, orchestrate, and deploy AI agents and multi-agent systems. Prior to 1.71.0, an Arbitrary File Write vulnerability has been identified in Microsoft's Semantic...

CVSS 9.9 EPSS 0.1% semantic-kernel Patch: 1.39.3 CWE-22
View details
CRITICAL CVE-2026-25115

n8n is an open source workflow automation platform. Prior to version 2.4.8, a vulnerability in the Python Code node allows authenticated users to break out of the Python sandbox environment and...

CVSS 9.9 n8n CWE-693
View details
CRITICAL CVE-2026-25053

n8n is an open source workflow automation platform. Prior to versions 1.123.10 and 2.5.0, vulnerabilities in the Git node allowed authenticated users with permission to create or modify workflows to...

CVSS 9.9 n8n CWE-78
View details
CRITICAL CVE-2026-25052

n8n is an open source workflow automation platform. Prior to versions 1.123.18 and 2.5.0, a vulnerability in the file access controls allows authenticated users with permission to create or modify...

CVSS 9.9 n8n CWE-367
View details
CRITICAL CVE-2026-25049

n8n is an open source workflow automation platform. Prior to versions 1.123.17 and 2.5.2, an authenticated user with permission to create or modify workflows could abuse crafted expressions in...

CVSS 9.9 n8n CWE-913
View details
CRITICAL CVE-2026-22778

vLLM is an inference and serving engine for large language models (LLMs). From 0.8.3 to before 0.14.1, when an invalid image is sent to vLLM's multimodal endpoint, PIL throws an error. vLLM returns...

CVSS 9.8 EPSS 0.1% vllm CWE-532
View details
CRITICAL CVE-2026-25481

Langroid has WAF Bypass Leading to RCE in TableChatAgent

EPSS 0.0% CWE-94
View details
CRITICAL CVE-2026-25130

CAI find_file Agent Tool has Command Injection Vulnerability Through Argument Injection

CVSS 9.7 EPSS 0.0% CWE-78
View details
CRITICAL CVE-2026-1470

n8n contains a critical Remote Code Execution (RCE) vulnerability in its workflow Expression evaluation system. Expressions supplied by authenticated users during workflow configuration may be...

CVSS 9.9 n8n CWE-95
View details
CRITICAL CVE-2025-13374

The Kalrav AI Agent plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the kalrav_upload_file AJAX action in all versions up to, and including, 2.3.3....

CVSS 9.8 CWE-434
View details
CRITICAL CVE-2026-22807

vLLM is an inference and serving engine for large language models (LLMs). Starting in version 0.10.1 and prior to version 0.14.0, vLLM loads Hugging Face `auto_map` dynamic modules during model...

CVSS 9.8 EPSS 0.0% vllm CWE-94
View details
CRITICAL CVE-2026-0863

Using string formatting and exception handling, an attacker may bypass n8n's python-task-executor sandbox restrictions and run arbitrary unrestricted Python code in the underlying operating system....

CVSS 9.9 n8n CWE-94
View details
CRITICAL CVE-2026-21877

n8n is an open source workflow automation platform. In versions 0.121.2 and below, an authenticated attacker may be able to execute malicious code using the n8n service. This could result in full...

CVSS 9.9 n8n CWE-94
View details
CRITICAL CVE-2026-21858

n8n is an open source workflow automation platform. Versions starting with 1.65.0 and below 1.121.0 enable an attacker to access files on the underlying server through execution of certain form-based...

CVSS 10.0 n8n
View details
CRITICAL CVE-2026-21445

Langflow is a tool for building and deploying AI-powered agents and workflows. Prior to version 1.7.0.dev45, multiple critical API endpoints in Langflow are missing authentication controls. The issue...

CVSS 9.1 EPSS 0.1% langflow CWE-306
View details
CRITICAL CVE-2025-68668

n8n is an open source workflow automation platform. From version 1.0.0 to before 2.0.0, a sandbox bypass vulnerability exists in the Python Code Node that uses Pyodide. An authenticated user with...

CVSS 9.9 n8n
View details
CRITICAL CVE-2025-68665

LangChain is a framework for building LLM-powered applications. Prior to @langchain/core versions 0.3.80 and 1.1.8, and prior to langchain versions 0.3.37 and 1.2.3, a serialization injection...

CVSS 9.1 langchain.js
View details
CRITICAL CVE-2025-63389

A critical authentication bypass vulnerability exists in Ollama platform's API endpoints in versions prior to and including v0.12.3. The platform exposes multiple API endpoints without requiring...

CVSS 9.8 ollama
View details
CRITICAL CVE-2025-67511

Cybersecurity AI (CAI) is an open-source framework for building and deploying AI-powered offensive and defensive automation. Versions 0.5.9 and below are vulnerable to Command Injection through the...

CVSS 9.6 EPSS 0.2% CWE-77
View details
CRITICAL CVE-2025-34351

Ray's New Token Authentication is Disabled By Default

EPSS 0.5% ray CWE-304
View details
CRITICAL CVE-2025-62593

Ray is vulnerable to Critical RCE via Safari & Firefox Browsers through DNS Rebinding Attack

EPSS 0.0% ray Patch: 2.52.0 CWE-94
View details
CRITICAL CVE-2025-62608

MLX is an array framework for machine learning on Apple silicon. Prior to version 0.29.4, there is a heap buffer overflow in mlx::core::load() when parsing malicious NumPy .npy files....

CVSS 9.1 EPSS 0.1% mlx CWE-122
View details
CRITICAL CVE-2025-12060

The keras.utils.get_file API in Keras, when used with the extract=True option for tar archives, is vulnerable to a path traversal attack. The utility uses Python's tarfile.extractall function without...

CVSS 9.8 EPSS 0.1% keras Patch: 3.12.0 CWE-22
View details
CRITICAL CVE-2025-11201

MLflow Tracking Server Model Creation Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of MLflow...

CVSS 9.8 EPSS 9.1% mlflow CWE-22
View details
CRITICAL CVE-2025-11200

MLflow Weak Password Requirements Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of MLflow. Authentication is not...

CVSS 9.8 EPSS 0.2% mlflow CWE-521
View details
CRITICAL CVE-2025-49655

Deserialization of untrusted data can occur in versions of the Keras framework running versions 3.11.0 up to but not including 3.11.3, enabling a maliciously uploaded Keras file containing a...

CVSS 9.8 EPSS 0.0% keras Patch: 3.11.3 CWE-502
View details
CRITICAL GHSA-m9mp-6x32-5rhg

scio is vunerable to Remote Command Execution through PyTorch

CWE-502
View details
CRITICAL CVE-2025-59434

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to August 2025 Cloud-Hosted Flowise, an authenticated vulnerability in Flowise Cloud allows any user on...

CVSS 9.6
View details
CRITICAL CVE-2025-9556

Langchaingo supports the use of jinja2 syntax when parsing prompts, which is in turn parsed using the gonja library v1.5.3. Gonja supports include and extends syntax to read files, which leads to a...

CVSS 9.8
View details
CRITICAL CVE-2025-55526

n8n-workflows Main Commit ee25413 allows attackers to execute a directory traversal via the download_workflow function within api_server.py

CVSS 9.1 fastapi
View details

Need deeper analysis?

Get ATLAS technique mappings, compliance reports (ISO 42001, EU AI Act), breaking alerts, and full CISO analysis with a Pro subscription.

Start 14-Day Free Trial