AI Security Threat Feed

Latest CVEs affecting AI/ML systems, updated continuously. Tracked from NVD, GitHub Advisory, and CISA KEV.

1,140

AI/ML CVEs Tracked

171

Critical

228

New This Week

2

In CISA KEV

Weekly CISO Take + top threats

Get the week's most critical AI security threats delivered every Monday. Free, no spam.

Latest AI Security Threats

Showing 26 of 26 results — Critical severity, has patch
CRITICAL CVE-2026-33309

Langflow is a tool for building and deploying AI-powered agents and workflows. Versions 1.2.0 through 1.8.1 have a bypass of the patch for CVE-2025-68478 (External Control of File Name), leading to...

Code Execution Auth Bypass Supply Chain Framework Agent Plugin
CVSS 9.9 langflow Patch: 1.9.0 CWE-22
View details
CRITICAL CVE-2025-15031

A vulnerability in MLflow's pyfunc extraction process allows for arbitrary file writes due to improper handling of tar archive entries. Specifically, the use of `tarfile.extractall` without path...

Supply Chain Model Poisoning Code Execution Framework Model Training Data
CVSS 9.1 EPSS 0.0% mlflow Patch: 3.9.0rc0 CWE-22
View details
CRITICAL CVE-2026-27825

MCP Atlassian has an arbitrary file write leading to arbitrary code execution via unconstrained download_path in confluence_download_attachment

CVSS 9.1 EPSS 0.0% mcp-atlassian Patch: 0.17.0 CWE-22
View details
CRITICAL GHSA-g38g-8gr9-h9xp

PickleScan has multiple stdlib modules with direct RCE not in blocklist

CVSS 9.8 picklescan Patch: 1.0.4 CWE-184
View details
CRITICAL GHSA-vvpj-8cmc-gx39

PickleScan's pkgutil.resolve_name has a universal blocklist bypass

CVSS 10.0 picklescan Patch: 1.0.4 CWE-183
View details
CRITICAL GHSA-7wx9-6375-f5wh

PickleScan's profile.run blocklist mismatch allows exec() bypass

CVSS 9.8 picklescan Patch: 1.0.4 CWE-184
View details
CRITICAL CVE-2026-2635

MLflow Use of Default Password Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of MLflow. Authentication is not...

Model Poisoning Code Execution Auth Bypass Framework RAG Model
CVSS 9.8 EPSS 0.7% mlflow Patch: 3.8.0rc0 CWE-1393
View details
CRITICAL CVE-2026-26030

Microsoft Semantic Kernel InMemoryVectorStore filter functionality vulnerable to remote code execution

CVSS 10.0 EPSS 0.1% semantic-kernel Patch: 1.39.4 CWE-94
View details
CRITICAL CVE-2026-25592

Semantic Kernel is an SDK used to build, orchestrate, and deploy AI agents and multi-agent systems. Prior to 1.71.0, an Arbitrary File Write vulnerability has been identified in Microsoft's Semantic...

CVSS 9.9 EPSS 0.1% semantic-kernel Patch: 1.39.3 CWE-22
View details
CRITICAL CVE-2025-62593

Ray is vulnerable to Critical RCE via Safari & Firefox Browsers through DNS Rebinding Attack

EPSS 0.0% ray Patch: 2.52.0 CWE-94
View details
CRITICAL CVE-2025-12060

The keras.utils.get_file API in Keras, when used with the extract=True option for tar archives, is vulnerable to a path traversal attack. The utility uses Python's tarfile.extractall function without...

CVSS 9.8 EPSS 0.1% keras Patch: 3.12.0 CWE-22
View details
CRITICAL CVE-2025-49655

Deserialization of untrusted data can occur in versions of the Keras framework running versions 3.11.0 up to but not including 3.11.3, enabling a maliciously uploaded Keras file containing a...

CVSS 9.8 EPSS 0.0% keras Patch: 3.11.3 CWE-502
View details
CRITICAL CVE-2025-54950

ExecuTorch out-of-bounds access vulnerability

CVSS 9.8 EPSS 0.2% executorch Patch: 0.7.0 CWE-125
View details
CRITICAL CVE-2025-54951

ExecuTorch vulnerable to Heap-based Buffer Overflow

CVSS 9.8 EPSS 0.2% executorch Patch: 0.7.0 CWE-122
View details
CRITICAL CVE-2025-54949

ExecuTorch heap buffer overflow vulnerability

CVSS 9.8 EPSS 0.2% executorch Patch: 0.7.0 CWE-122
View details
CRITICAL CVE-2025-30405

ExecuTorch integer overflow vulnerability

CVSS 9.8 EPSS 0.2% executorch Patch: 0.7.0 CWE-190
View details
CRITICAL CVE-2025-30404

ExecuTorch integer overflow vulnerability

CVSS 9.8 EPSS 0.2% executorch Patch: 0.7.0 CWE-190
View details
CRITICAL CVE-2025-1793

llama_index vulnerable to SQL Injection

CVSS 9.8 EPSS 0.0% llama-index Patch: 0.12.28 CWE-89
View details
CRITICAL CVE-2025-47241

Browser Use allows bypassing `allowed_domains` by putting a decoy domain in http auth username portion of a URL

CVSS 9.3 EPSS 0.2% browser-use Patch: 0.1.45 CWE-647
View details
CRITICAL GHSA-ggpf-24jw-3fcw

CVE-2025-24357 Malicious model remote code execution fix bypass with PyTorch < 2.6.0

CVSS 9.8 vllm Patch: 0.8.0 CWE-1395
View details
CRITICAL CVE-2024-8019

PyTorch Lightning path traversal vulnerability

CVSS 9.1 EPSS 1.1% pytorch-lightning Patch: 2.4.0 CWE-434
View details
CRITICAL CVE-2024-52803

LLama Factory enables fine-tuning of large language models. A critical remote OS command injection vulnerability has been identified in the LLama Factory training process. This vulnerability arises...

CVSS 9.8 EPSS 2.4% llamafactory Patch: 0.9.1 CWE-78
View details
CRITICAL CVE-2023-6020

Ray Missing Authorization vulnerability

CVSS 9.3 EPSS 80.4% ray Patch: 2.8.1 CWE-598
View details
CRITICAL CVE-2023-6019

Ray OS Command Injection vulnerability

CVSS 9.8 EPSS 88.7% ray Patch: 2.8.1 CWE-78
View details
CRITICAL CVE-2023-6021

Ray Path Traversal vulnerability

CVSS 9.3 EPSS 87.3% ray Patch: 2.8.1 CWE-22
View details
CRITICAL CVE-2023-32785

Langchain SQL Injection vulnerability

CVSS 9.8 langchain Patch: 0.0.247 CWE-74
View details

Need deeper analysis?

Get ATLAS technique mappings, compliance reports (ISO 42001, EU AI Act), breaking alerts, and full CISO analysis with a Pro subscription.

Start 14-Day Free Trial