AI Security Threat Feed

Latest CVEs affecting AI/ML systems, updated continuously. Tracked from NVD, GitHub Advisory, and CISA KEV.

1,140

AI/ML CVEs Tracked

171

Critical

228

New This Week

2

In CISA KEV

Weekly CISO Take + top threats

Get the week's most critical AI security threats delivered every Monday. Free, no spam.

Latest AI Security Threats

Showing 50 of 1140 results
CRITICAL CVE-2025-33244

NVIDIA APEX for Linux contains a vulnerability where an unauthorized attacker could cause a deserialization of untrusted data. This vulnerability affects environments that use PyTorch versions...

Code Execution Supply Chain Data Extraction Framework Training Data
CVSS 9.0 CWE-502
View details
UNKNOWN CVE-2026-33401

Wallos is an open-source, self-hostable personal subscription tracker. Prior to version 4.7.0, the patch introduced in commit e8a513591 (CVE-2026-30840) added SSRF protection to notification test...

Data Extraction Auth Bypass Privacy Violation Inference API
CWE-918
View details
HIGH CVE-2026-33497

Langflow is a tool for building and deploying AI-powered agents and workflows. Prior to version 1.7.1, in the download_profile_picture function of the /profile_pictures/{folder_name}/{file_name}...

Data Extraction Auth Bypass Framework Agent
CVSS 7.5 langflow Patch: 1.7.1 CWE-22
View details
HIGH CVE-2026-33484

Langflow is a tool for building and deploying AI-powered agents and workflows. In versions 1.0.0 through 1.8.1, the `/api/v1/files/images/{flow_id}/{file_name}` endpoint serves image files without...

Auth Bypass Data Extraction Privacy Violation Framework API
CVSS 7.5 langflow CWE-284
View details
CRITICAL CVE-2026-33475

Langflow is a tool for building and deploying AI-powered agents and workflows. An unauthenticated remote shell injection vulnerability exists in multiple GitHub Actions workflows in the Langflow...

Supply Chain Code Execution Data Extraction Framework Agent
CVSS 9.1 langflow CWE-74
View details
CRITICAL CVE-2026-33309

Langflow is a tool for building and deploying AI-powered agents and workflows. Versions 1.2.0 through 1.8.1 have a bypass of the patch for CVE-2025-68478 (External Control of File Name), leading to...

Code Execution Auth Bypass Supply Chain Framework Agent Plugin
CVSS 9.9 langflow Patch: 1.9.0 CWE-22
View details
MEDIUM CVE-2026-30886

New API is a large language mode (LLM) gateway and artificial intelligence (AI) asset management system. Prior to version 0.11.4-alpha.2, an Insecure Direct Object Reference (IDOR) vulnerability in...

Data Leakage Code Execution API Model Inference
CVSS 6.5 CWE-639
View details
MEDIUM CVE-2026-4538

A vulnerability was identified in PyTorch 2.10.0. The affected element is an unknown function of the component pt2 Loading Handler. The manipulation leads to deserialization. The attack can only be...

Model Poisoning Code Execution Framework RAG Model
CVSS 5.3 CWE-20
View details
HIGH CVE-2026-33053

Langflow is a tool for building and deploying AI-powered agents and workflows. In versions prior to 1.9.0, the delete_api_key_route() endpoint accepts an api_key_id path parameter and deletes it with...

Supply Chain Code Execution DoS Framework Agent API
CVSS 8.8 EPSS 0.0% langflow CWE-639
View details
CRITICAL CVE-2026-33017

Langflow is a tool for building and deploying AI-powered agents and workflows. In versions prior to 1.9.0, the POST /api/v1/build_public_tmp/{flow_id}/flow endpoint allows building public flows...

Model Poisoning Code Execution Framework Agent API
CVSS 9.8 EPSS 0.5% langflow CWE-95
View details
HIGH CVE-2026-33236

NLTK has a Downloader Path Traversal Vulnerability (AFO) - Arbitrary File Overwrite

CVSS 8.1 EPSS 0.0% CWE-22
View details
CRITICAL CVE-2025-15031

A vulnerability in MLflow's pyfunc extraction process allows for arbitrary file writes due to improper handling of tar archive entries. Specifically, the use of `tarfile.extractall` without path...

Supply Chain Model Poisoning Code Execution Framework Model Training Data
CVSS 9.1 EPSS 0.0% mlflow Patch: 3.9.0rc0 CWE-22
View details
HIGH CVE-2026-33155

DeepDiff has Memory Exhaustion DoS through SAFE_TO_IMPORT

EPSS 0.0% CWE-400
View details
CRITICAL CVE-2026-28500

Open Neural Network Exchange (ONNX) is an open standard for machine learning interoperability. In versions up to and including 1.20.1, a security control bypass exists in onnx.hub.load() due to...

Supply Chain Model Poisoning Code Execution Framework RAG API
CVSS 9.1 EPSS 0.0% onnx CWE-345
View details
UNKNOWN CVE-2026-25083

GROWI OpenAI thread/message API endpoints do not perform authorization. Affected are v7.4.5 and earlier versions. A logged-in user who knows a shared AI assistant's identifier may view and/or tamper...

Prompt Injection Data Leakage Model Poisoning API RAG Inference
CWE-862
View details
HIGH CVE-2025-14287

A command injection vulnerability exists in mlflow/mlflow versions before v3.7.0, specifically in the `mlflow/sagemaker/__init__.py` file at lines 161-167. The vulnerability arises from the direct...

Supply Chain Model Poisoning Code Execution Framework Model
CVSS 7.5 EPSS 0.1% mlflow Patch: 3.8.0rc0 CWE-94
View details
MEDIUM GHSA-5cxw-w2xg-2m8h

fickling's `platform` module subprocess invocation evades `check_safety()` with `LIKELY_SAFE`

fickling Patch: 0.1.10 CWE-184
View details
MEDIUM GHSA-r48f-3986-4f9c

fickling modules linecache, difflib and gc are missing from the unsafe modules blocklist

fickling Patch: 0.1.10 CWE-184
View details
CRITICAL CVE-2026-27825

MCP Atlassian has an arbitrary file write leading to arbitrary code execution via unconstrained download_path in confluence_download_attachment

CVSS 9.1 EPSS 0.0% mcp-atlassian Patch: 0.17.0 CWE-22
View details
HIGH CVE-2026-27826

MCP Atlassian has SSRF via unvalidated X-Atlassian-Jira-Url / X-Atlassian-Confluence-Url headers

CVSS 8.2 EPSS 0.1% mcp-atlassian Patch: 0.17.0 CWE-918
View details
CRITICAL CVE-2026-25960

vLLM is an inference and serving engine for large language models (LLMs). The SSRF protection fix for CVE-2026-24779 add in 0.15.1 can be bypassed in the load_from_url_async method due to...

Data Extraction Data Leakage Code Execution Inference RAG Agent
CVSS 9.8 EPSS 0.0% vllm CWE-918
View details
CRITICAL CVE-2026-30821

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to version 3.0.13, the /api/v1/attachments/:chatflowId/:chatId endpoint is listed in WHITELIST_URLS,...

Code Execution Framework RAG Plugin
CVSS 9.8 CWE-434
View details
MEDIUM CVE-2026-2589

The Greenshift – animation and page builder blocks plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 12.8.3 via the automated Settings Backup...

Data Extraction Data Leakage Supply Chain API RAG Plugin
CVSS 5.3 CWE-200
View details
HIGH GHSA-5r2p-pjr8-7fh7

SageMaker Python SDK replaced eval() with safe parser in JumpStart search functionality

sagemaker Patch: 3.4.0 CWE-184
View details
MEDIUM CVE-2026-28277

LangGraph checkpoint loading has unsafe msgpack deserialization

CVSS 6.8 EPSS 0.0% langgraph Patch: 1.0.10 CWE-502
View details
HIGH CVE-2026-25048

xgrammar vulnerable to DoS via multi-layer nesting

EPSS 0.1% xgrammar Patch: 0.1.32 CWE-674
View details
HIGH CVE-2026-25750

Langchain Helm Charts are Helm charts for deploying Langchain applications on Kubernetes. Prior to langchain-ai/helm version 0.12.71, a URL parameter injection vulnerability existed in LangSmith...

Prompt Injection Data Leakage Code Execution Framework Agent API
CVSS 8.1 langsmith CWE-74
View details
HIGH GHSA-5hwf-rc88-82xm

Fickling missing RCE-capable modules in UNSAFE_IMPORTS

fickling Patch: 0.1.9 CWE-184
View details
HIGH GHSA-wccx-j62j-r448

Fickling has `always_check_safety()` bypass: pickle.loads and _pickle.loads remain unhooked

fickling Patch: 0.1.9 CWE-693
View details
HIGH CVE-2026-27905

BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.36, the safe_extract_tarfile() function validates that each tar member's path...

Code Execution Framework Agent Model
CVSS 7.8 EPSS 0.0% bentoml CWE-59
View details
CRITICAL GHSA-g38g-8gr9-h9xp

PickleScan has multiple stdlib modules with direct RCE not in blocklist

CVSS 9.8 picklescan Patch: 1.0.4 CWE-184
View details
CRITICAL GHSA-vvpj-8cmc-gx39

PickleScan's pkgutil.resolve_name has a universal blocklist bypass

CVSS 10.0 picklescan Patch: 1.0.4 CWE-183
View details
CRITICAL GHSA-7wx9-6375-f5wh

PickleScan's profile.run blocklist mismatch allows exec() bypass

CVSS 9.8 picklescan Patch: 1.0.4 CWE-184
View details
HIGH CVE-2026-28416

Gradio is an open-source Python package designed for quick prototyping. Prior to version 6.6.0, a Server-Side Request Forgery (SSRF) vulnerability in Gradio allows an attacker to make arbitrary HTTP...

Data Extraction Code Execution Framework Model Training Data
CVSS 8.6 EPSS 0.0% gradio CWE-918
View details
MEDIUM CVE-2026-28415

Gradio is an open-source Python package designed for quick prototyping. Prior to version 6.6.0, the _redirect_to_target() function in Gradio's OAuth flow accepts an unvalidated _target_url query...

Data Extraction Code Execution Auth Bypass Framework RAG API
CVSS 4.7 EPSS 0.0% gradio CWE-200
View details
HIGH CVE-2026-28414

Gradio is an open-source Python package designed for quick prototyping. Prior to version 6.7, Gradio apps running on Window with Python 3.13+ are vulnerable to an absolute path traversal issue that...

Code Execution Data Extraction Framework API Model
CVSS 7.5 EPSS 0.0% gradio CWE-36
View details
MEDIUM CVE-2026-27167

Gradio is an open-source Python package designed for quick prototyping. Starting in version 4.16.0 and prior to version 6.6.0, Gradio applications running outside of Hugging Face Spaces automatically...

Supply Chain Model Poisoning Code Execution Framework Agent API
CVSS 5.9 EPSS 0.0% gradio CWE-522
View details
CRITICAL CVE-2026-27966

Langflow is a tool for building and deploying AI-powered agents and workflows. Prior to version 1.8.0, the CSV Agent node in Langflow hardcodes `allow_dangerous_code=True`, which automatically...

Prompt Injection Code Execution Framework RAG Agent
CVSS 9.8 EPSS 0.2% langflow CWE-94
View details
MEDIUM CVE-2026-27578

n8n is an open source workflow automation platform. Prior to versions 2.10.1, 2.9.3, and 1.123.22, an authenticated user with permission to create or modify workflows could inject arbitrary scripts...

Prompt Injection Data Extraction Code Execution Agent RAG API
CVSS 5.4 n8n CWE-79
View details
CRITICAL CVE-2026-27577

n8n is an open source workflow automation platform. Prior to versions 2.10.1, 2.9.3, and 1.123.22, additional exploits in the expression evaluation of n8n have been identified and patched following...

Model Poisoning Code Execution Social Engineering Agent RAG API
CVSS 9.9 n8n CWE-94
View details
HIGH CVE-2026-27498

n8n is an open source workflow automation platform. Prior to versions 2.2.0 and 1.123.8, an authenticated user with permission to create or modify workflows could chain the Read/Write Files from Disk...

Model Poisoning Code Execution Agent RAG API
CVSS 8.8 n8n CWE-94
View details
HIGH CVE-2026-27497

n8n is an open source workflow automation platform. Prior to versions 2.10.1, 2.9.3, and 1.123.22, an authenticated user with permission to create or modify workflows could leverage the Merge node's...

Model Poisoning Code Execution Agent RAG API
CVSS 8.8 n8n CWE-89
View details
CRITICAL CVE-2026-27495

n8n is an open source workflow automation platform. Prior to versions 2.10.1, 2.9.3, and 1.123.22, an authenticated user with permission to create or modify workflows could exploit a vulnerability in...

Code Execution Social Engineering Agent RAG API
CVSS 9.9 n8n CWE-94
View details
CRITICAL CVE-2026-27494

n8n is an open source workflow automation platform. Prior to versions 2.10.1, 2.9.3, and 1.123.22, an authenticated user with permission to create or modify workflows could use the Python Code node...

Code Execution Agent RAG API
CVSS 9.9 n8n CWE-497
View details
CRITICAL CVE-2026-27493

n8n is an open source workflow automation platform. Prior to versions 2.10.1, 2.9.3, and 1.123.22, a second-order expression injection vulnerability existed in n8n's Form nodes that could allow an...

Code Execution Agent RAG API
CVSS 9.0 n8n CWE-94
View details
MEDIUM CVE-2026-27794

LangGraph: BaseCache Deserialization of Untrusted Data may lead to Remote Code Execution

CVSS 6.6 EPSS 0.3% CWE-502
View details
MEDIUM CVE-2026-27795

LangChain is a framework for building LLM-powered applications. Prior to version 1.1.8, a redirect-based Server-Side Request Forgery (SSRF) bypass exists in `RecursiveUrlLoader` in...

Data Extraction Code Execution DoS Framework RAG Agent
CVSS 4.1 CWE-918
View details
MEDIUM GHSA-mhc9-48gj-9gp3

Fickling has safety check bypass via REDUCE+BUILD opcode sequence

fickling Patch: 0.1.8 CWE-184
View details
HIGH GHSA-mxhj-88fx-4pcv

Fickling: OBJ opcode call invisibility bypasses all safety checks

fickling Patch: 0.1.8 CWE-436
View details
CRITICAL CVE-2026-2635

MLflow Use of Default Password Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of MLflow. Authentication is not...

Model Poisoning Code Execution Auth Bypass Framework RAG Model
CVSS 9.8 EPSS 0.7% mlflow Patch: 3.8.0rc0 CWE-1393
View details

Need deeper analysis?

Get ATLAS technique mappings, compliance reports (ISO 42001, EU AI Act), breaking alerts, and full CISO analysis with a Pro subscription.

Start 14-Day Free Trial