Attack Type

Code Execution

Remote code execution is unusually common in the AI/ML ecosystem because two long-standing patterns persist: pickle-based model loading and Jinja-style template rendering. Pickle is Python's default serialisation format and it executes arbitrary code on deserialisation; PyTorch models, scikit-learn pipelines, and many older HuggingFace artefacts are pickle files, so loading an untrusted model file is equivalent to running an untrusted script. HuggingFace addressed this with safetensors, but the older format is still widespread. The second pattern is template injection in LLM application frameworks that render Jinja-like syntax inside user-controlled prompts; LangChain, LlamaIndex, and several agent frameworks have shipped CVEs of this shape. Inference servers (vLLM, Triton, BentoML, Ray Serve) round out the RCE landscape with the usual web-app issues. Defenses: never load model files from untrusted sources, prefer safetensors, sandbox inference, and audit any code path that combines user input with template rendering.

800
Total CVEs
40
Pages
Page 1 of 40
Current
Severity CVE CVSS
UNKNOWN CVE-2026-2492 -
HIGH CVE-2026-4538 7.8
HIGH CVE-2026-27795 7.4
CRITICAL CVE-2026-27966 9.8
HIGH CVE-2026-25750 8.1
CRITICAL CVE-2026-30741 9.8
HIGH CVE-2026-0847 8.6
CRITICAL CVE-2026-28500 9.1
HIGH CVE-2026-2033 8.1
CRITICAL CVE-2026-2635 9.8
HIGH CVE-2025-14287 7.5
CRITICAL CVE-2025-15031 9.1
CRITICAL CVE-2026-25960 9.8
CRITICAL CVE-2026-33017 9.8
HIGH CVE-2026-33053 8.8
MEDIUM CVE-2026-27167 5.9
HIGH CVE-2026-28414 7.5
MEDIUM CVE-2026-28415 4.7
HIGH CVE-2026-28416 8.6
HIGH CVE-2026-30820 8.8

Page 1 of 40