AI Security Threat Feed

Latest CVEs affecting AI/ML systems, updated continuously. Tracked from NVD, GitHub Advisory, and CISA KEV.

1,604

AI/ML CVEs Tracked

225

Critical

79

New This Week

16

In CISA KEV

Latest AI Security Threats

Showing 20 of 684 results — High severity
HIGH

LangChain: deserialization poisons LLM chat history

CVE-2026-44843
8.2
Prompt Injection Code Execution Supply Chain Framework Agent
langchain-core Patch: 1.3.3 CWE-502 4.3K 5 ATLAS
HIGH

Open WebUI: path traversal + file upload leads to RCE

CVE-2026-44566
7.3
Code Execution Supply Chain Inference Model
open-webui Patch: 0.1.124 CWE-22 5 ATLAS
HIGH

Open WebUI: auth bypass gives pending users full LLM access

CVE-2026-44567
7.3
Auth Bypass Data Extraction DoS API Inference
open-webui Patch: 0.1.124 CWE-862 4 ATLAS
HIGH

open-webui: XSS via XLSX preview enables session hijack

CVE-2026-44549
7.3
Code Execution Data Extraction Auth Bypass Framework API
open-webui Patch: 0.8.0 CWE-79 7 ATLAS
HIGH

banks: SSTI enables RCE via unsandboxed Jinja2 templates

CVE-2026-44209
7.5
Code Execution Supply Chain Framework Agent
banks Patch: 2.4.2 CWE-1336 154 4 ATLAS
HIGH

open-webui: RAG poisoning via unauthorized KB overwrite

CVE-2026-44554
8.1
Auth Bypass Model Poisoning Prompt Injection RAG API Framework
open-webui Patch: 0.9.0 CWE-862 8 ATLAS
HIGH

open-webui: auth bypass allows unrestricted model access

CVE-2026-44556
7.1
Auth Bypass DoS Data Extraction API Inference Model
open-webui Patch: 0.9.0 CWE-284 8 ATLAS
HIGH

Open WebUI's Base Model Routing Bypasses Access Control via Model Chaining

CVE-2026-44555
7.6
open-webui Patch: 0.9.0 CWE-862
HIGH

Open WebUI: Redis Cache Keys tool_servers and terminal_servers Missing Instance Prefix Enable Cross-Instance Cache Poisoning

CVE-2026-44552
8.7
open-webui Patch: 0.9.0 CWE-668
HIGH

Open WebUI: Stale Admin Role in Socket.IO Session Pool Enables Post-Demotion Cross-User Note Access

CVE-2026-44553
8.1
open-webui Patch: 0.9.0 CWE-384
HIGH

open-webui Vulnerable to Stored XSS via Model Description

CVE-2026-44721
7.3
open-webui Patch: 0.9.0 CWE-79
HIGH

n8n-mcp affected by path traversal, redirect-following SSRF, and telemetry payload exposure

GHSA-8g7g-hmwm-6rv2
8.3
n8n-mcp Patch: 2.50.1 CWE-22 16
HIGH

LiteLLM is a proxy server (AI Gateway) to call LLM APIs in OpenAI (or native) format. From version 1.74.2 to before version 1.83.7, two endpoints used to...

CVE-2026-42271
8.8
EPSS 0.0%
litellm CWE-77 4
HIGH

Diffusers has a `trust_remote_code` bypass via `custom_pipeline` and local custom components

CVE-2026-44513
8.8
diffusers Patch: 0.38.0 CWE-94 385
HIGH

Diffusers: None.py has Trust Remote Code Bypass

GHSA-j7w6-vpvq-j3gm
8.8
diffusers Patch: 0.38.0 CWE-94 385
HIGH

Aegra has cross-user run injection in /threads/{thread_id}/runs (IDOR)

CVE-2026-44504
--
aegra-api Patch: 0.9.7 CWE-285 3.1K
HIGH

PraisonAI has unauthenticated RCE via `tool_override.py` (CVE-2026-40287 patch bypass)

CVE-2026-44334
8.4
praisonai Patch: 4.6.32 CWE-94 1
HIGH

PraisonAI has an SSRF bypass

CVE-2026-44335
--
praisonaiagents Patch: 1.6.32 CWE-918 11
HIGH

GitPython: Newline injection in config_writer().set_value() enables RCE via core.hooksPath

CVE-2026-44244
7.8
EPSS 0.0%
GitPython Patch: 3.1.49 CWE-94 80
HIGH

JupyterLab's command linker attributes in HTML enable one-click command execution from untrusted content

CVE-2026-42557
--
notebook Patch: 7.5.6 CWE-79 2.9K

Need deeper analysis?

Get ATLAS technique mappings, compliance reports (ISO 42001, EU AI Act), breaking alerts, and full CISO analysis with a Pro subscription.

Start 14-Day Free Trial