AI Component

RAG

Retrieval-Augmented Generation pairs an LLM with an external knowledge store — typically a vector database holding embeddings of documents — so the model can ground its responses in up-to-date or proprietary information. The retrieval layer creates two distinct attack surfaces. First, the index itself can be poisoned: an attacker who can write into the source documents plants malicious content that the retriever will later surface to the LLM, enabling indirect prompt injection at retrieval time. Second, the embedding pipeline and the vector store (Pinecone, Weaviate, Chroma, pgvector, Qdrant) have their own vulnerabilities — authentication bypass, query injection, and unauthorized cross-tenant retrieval. RAG is also a common vector for training-data exfiltration when retrieved context is later used to fine-tune downstream models. Defenses: provenance tagging on retrieved content, source-aware system prompts, ACL-enforced retrieval, and tenant isolation in the vector store.

92
Total CVEs
5
Pages
Page 1 of 5
Current
Severity CVE CVSS
UNKNOWN CVE-2026-2492 -
HIGH CVE-2026-4538 7.8
HIGH CVE-2026-27795 7.4
CRITICAL CVE-2026-27966 9.8
MEDIUM CVE-2026-2589 5.3
UNKNOWN CVE-2026-25083 -
CRITICAL CVE-2026-28500 9.1
HIGH CVE-2026-2033 8.1
CRITICAL CVE-2026-2635 9.8
CRITICAL CVE-2026-25960 9.8
MEDIUM CVE-2026-28415 4.7
CRITICAL CVE-2026-30821 9.8
CRITICAL CVE-2026-27493 9.0
CRITICAL CVE-2026-27494 9.9
CRITICAL CVE-2026-27495 9.9
HIGH CVE-2026-27497 8.8
HIGH CVE-2026-27498 8.8
CRITICAL CVE-2026-27577 9.9
MEDIUM CVE-2026-27578 5.4
MEDIUM CVE-2025-12343 5.5

Page 1 of 5