AI Security Threat Feed
Latest CVEs affecting AI/ML systems, updated continuously. Tracked from NVD, GitHub Advisory, and CISA KEV.
AI/ML CVEs Tracked
Critical
New This Week
In CISA KEV
Weekly CISO Take + top threats
Get the week's most critical AI security threats delivered every Monday. Free, no spam.
Latest AI Security Threats
Showing 50 of 377 results — Medium severity CVE-2025-3933 A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in the Hugging Face Transformers library, specifically within the DonutProcessor class's `token2json()` method. This...
CVE-2025-6716 The Photos, Files, YouTube, Twitter, Instagram, TikTok, Ecommerce Contest Gallery – Upload, Vote, Sell via PayPal or Stripe, Social Share Buttons, OpenAI plugin for WordPress is vulnerable to Stored...
CVE-2025-7021 Fullscreen API Spoofing and UI Redressing in the handling of Fullscreen API and UI rendering in OpenAI Operator SaaS on Web allows a remote attacker to capture sensitive user input (e.g., login...
CVE-2025-6211 LlamaIndex vulnerable to data loss through hash collisions in its DocugamiReader class
CVE-2025-6210 LlamaIndex vulnerability in its ObsidianReader class can lead to Path Traversal exploit
CVE-2025-5472 LlamaIndex vulnerable to DoS attack through uncontrolled recursive JSON parsing
CVE-2025-3044 LlamaIndex vulnerability in ArxivReader class can cause MD5 hash collisions
CVE-2025-3264 A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in the Hugging Face Transformers library, specifically in the `get_imports()` function within `dynamic_module_utils.py`....
CVE-2025-3263 A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in the Hugging Face Transformers library, specifically in the `get_configuration_file()` function within the...
CVE-2025-3108 LlamaIndex has Incomplete Documentation of Program Execution related to JsonPickleSerializer component
CVE-2025-52554 n8n is a workflow automation platform. Prior to version 1.99.1, an authorization vulnerability was discovered in the /rest/executions/:id/stop endpoint of n8n. An authenticated user can stop workflow...
CVE-2025-45809 SQL Injection vulnerability in BerriAI LiteLLM before 1.81.0 allows attackers to execute arbitrary commands via the key parameter to the "/key/block" and "/key/unblock" API endpoints.
CVE-2025-49595 n8n is a workflow automation platform. Prior to version 1.99.0, there is a denial of Service vulnerability in /rest/binary-data endpoint when processing empty filesystem URIs (filesystem:// or...
CVE-2025-6854 A vulnerability classified as problematic was found in chatchat-space Langchain-Chatchat up to 0.3.1. This vulnerability affects unknown code of the file /v1/files?purpose=assistants. The...
CVE-2025-49592 n8n is a workflow automation platform. Versions prior to 1.98.0 have an Open Redirect vulnerability in the login flow. Authenticated users can be redirected to untrusted, attacker-controlled domains...
CVE-2025-52967 gateway_proxy_handler in MLflow before 3.1.0 lacks gateway_path validation.
CVE-2025-48944 vLLM is an inference and serving engine for large language models (LLMs). In version 0.8.0 up to but excluding 0.9.0, the vLLM backend used with the /v1/chat/completions OpenAPI endpoint fails to...
CVE-2025-48943 vLLM is an inference and serving engine for large language models (LLMs). Version 0.8.0 up to but excluding 0.9.0 have a Denial of Service (ReDoS) that causes the vLLM server to crash if an invalid...
CVE-2025-48942 vLLM is an inference and serving engine for large language models (LLMs). In versions 0.8.0 up to but excluding 0.9.0, hitting the /v1/completions API with a invalid json_schema as a Guided Param...
CVE-2025-48887 vLLM, an inference and serving engine for large language models (LLMs), has a Regular Expression Denial of Service (ReDoS) vulnerability in the file...
GHSA-j828-28rj-hfhp vLLM vulnerable to Regular Expression Denial of Service
CVE-2025-1194 A Regular Expression Denial of Service (ReDoS) vulnerability was identified in the huggingface/transformers library, specifically in the file `tokenization_gpt_neox_japanese.py` of the...
CVE-2025-46343 n8n is a workflow automation platform. Prior to version 1.90.0, n8n is vulnerable to stored cross-site scripting (XSS) through the attachments view endpoint. n8n workflows can store and serve binary...
CVE-2025-3730 A vulnerability, which was classified as problematic, was found in PyTorch 2.6.0. Affected is the function torch.nn.functional.ctc_loss of the file aten/src/ATen/native/LossCTC.cpp. The manipulation...
GHSA-hf3c-wxg2-49q9 vLLM vulnerable to Denial of Service by abusing xgrammar cache
CVE-2025-32381 xgrammar Vulnerable to Denial of Service (DoS) by abusing unbounded cache in memory
GHSA-v7x6-rv5q-mhwc Picklescan missing detection when calling built-in python library function timeit.timeit()
GHSA-fj43-3qmq-673f Picklescan failed to detect to some unsafe global function in Numpy library
CVE-2025-3121 A vulnerability classified as problematic has been found in PyTorch 2.6.0. Affected is the function torch.jit.jit_module_from_flatbuffer. The manipulation leads to memory corruption. Local access is...
CVE-2025-31843 Missing Authorization vulnerability in Wilson OpenAI Tools for WordPress & WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects OpenAI Tools for...
CVE-2025-3001 A vulnerability classified as critical was found in PyTorch 2.6.0. This vulnerability affects the function torch.lstm_cell. The manipulation leads to memory corruption. The attack needs to be...
CVE-2025-3000 A vulnerability classified as critical has been found in PyTorch 2.6.0. This affects the function torch.jit.script. The manipulation leads to memory corruption. It is possible to launch the attack on...
CVE-2025-2999 A vulnerability was found in PyTorch 2.6.0. It has been rated as critical. Affected by this issue is the function torch.nn.utils.rnn.unpack_sequence. The manipulation leads to memory corruption....
CVE-2025-2998 A vulnerability was found in PyTorch 2.6.0. It has been declared as critical. Affected by this vulnerability is the function torch.nn.utils.rnn.pad_packed_sequence. The manipulation leads to memory...
CVE-2025-2953 A vulnerability, which was classified as problematic, has been found in PyTorch 2.6.0+cu124. Affected by this issue is the function torch.mkldnn_max_pool2d. The manipulation leads to denial of...
CVE-2025-0508 SageMaker Workflow component allows possibility of MD5 hash collisions
CVE-2024-7045 Open WebUI Has Improper Access Control Leading to Arbitrary Prompt Read
CVE-2024-7035 Open WebUI Vulnerable to Cross-Site Request Forgery (CSRF)
CVE-2024-7046 Open WebUI Allows Viewing of Admin Details
CVE-2024-7034 Open WebUI Allows Arbitrary File Write via the `/models/upload` Endpoint
CVE-2024-7033 Open WebUI Allows Arbitrary File Write via the `download_model` Endpoint
CVE-2024-7044 Open WebUI Vulnerable to Cross-Site Scripting (XSS) via Chat File Upload
CVE-2024-12910 LlamaIndex Uncontrolled Resource Consumption vulnerability
GHSA-564p-rx2q-4c8v BentoML Open Redirect vulnerability
CVE-2025-1474 In mlflow/mlflow version 2.18, an admin is able to create a new user account without setting a password. This vulnerability could lead to security risks, as accounts without passwords may be...
CVE-2024-8021 An open redirect vulnerability exists in the latest version of gradio-app/gradio. The vulnerability allows an attacker to redirect users to a malicious website by URL encoding. This can be exploited...
CVE-2024-6838 In mlflow/mlflow version v2.13.2, a vulnerability exists that allows the creation or renaming of an experiment with a large number of integers in its name due to the lack of a limit on the experiment...
CVE-2024-6577 In the latest version of pytorch/serve, the script 'upload_results_to_s3.sh' references the S3 bucket 'benchmarkai-metrics-prod' without ensuring its ownership or confirming its accessibility. This...
CVE-2024-12217 A vulnerability in the gradio-app/gradio repository, version git 67e4044, allows for path traversal on Windows OS. The implementation of the blocked_path functionality, which is intended to disallow...
CVE-2024-10940 A vulnerability in langchain-core versions >=0.1.17,<0.1.53, >=0.2.0,<0.2.43, and >=0.3.0,<0.3.15 allows unauthorized users to read arbitrary files from the host file system. The issue arises from...
Need deeper analysis?
Get ATLAS technique mappings, compliance reports (ISO 42001, EU AI Act), breaking alerts, and full CISO analysis with a Pro subscription.
Start 14-Day Free Trial