AI / ML

486 CVEs product

Monthly

CVE-2024-4147 MEDIUM POC This Month

Lunary contains a vulnerability that allows attackers to delete prompts created in other organizations through ID manipulation (CVSS 6.5).

Authentication Bypass AI / ML Lunary
NVD GitHub
CVSS 3.1
6.5
EPSS
0.1%
CVE-2024-2356 CRITICAL Act Now

Local File Inclusion in parisneo/lollms-webui /reinstall_extension endpoint allows authenticated users to include arbitrary local files. EPSS 0.26%.

Python RCE Lfi AI / ML
NVD GitHub
CVSS 3.0
9.6
EPSS
0.3%
CVE-2026-1117 HIGH PATCH This Week

Unauthenticated clients can invoke resource-intensive Socket.IO events in lollms 5.9.0 due to missing authentication checks in the event handler registration, allowing attackers to trigger denial of service and state corruption. The vulnerability is compounded by improper use of global state flags in multi-client environments, enabling attackers to interfere with legitimate client operations and manipulate server state through race conditions. No patch is currently available for this high-severity flaw affecting the AI/ML framework.

Denial Of Service Race Condition AI / ML
NVD GitHub
CVSS 3.0
8.2
EPSS
0.0%
CVE-2026-25130 CRITICAL Act Now

Multiple command injection vulnerabilities in CAI (Cybersecurity AI) framework up to 0.5.10 allow OS command execution through the security testing platform.

RCE AI / ML
NVD GitHub
CVSS 3.1
9.6
EPSS
0.0%
CVE-2025-69662 HIGH POC PATCH This Week

SQL injection vulnerability in geopandas before v.1.1.2 allows an attacker to obtain sensitive information via the to_postgis()` function being used to write GeoDataFrames to a PostgreSQL database. [CVSS 8.6 HIGH]

PostgreSQL SQLi AI / ML Geopandas Suse
NVD GitHub
CVSS 3.1
8.6
EPSS
0.0%
CVE-2026-24780 HIGH POC This Week

Remote code execution in AutoGPT Platform prior to v0.6.44 allows authenticated users to execute disabled blocks and write arbitrary Python code to the server filesystem. The vulnerability stems from insufficient validation of the disabled flag in block execution endpoints, enabling attackers to achieve code execution via the BlockInstallationBlock component. Public exploit code exists, and self-hosted instances with Supabase signup enabled are particularly vulnerable to account creation and exploitation.

Python RCE AI / ML Autogpt Platform
NVD GitHub
CVSS 3.1
8.8
EPSS
0.1%
CVE-2025-71011 MEDIUM POC This Month

An input validation vulnerability in the flow.Tensor.new_empty/flow.Tensor.new_ones/flow.Tensor.new_zeros component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input. [CVSS 6.2 MEDIUM]

Denial Of Service AI / ML Oneflow
NVD GitHub
CVSS 3.1
6.2
EPSS
0.0%
CVE-2025-71009 MEDIUM POC This Month

An input validation vulnerability in the flow.scatter/flow.scatter_add component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted indices. [CVSS 6.2 MEDIUM]

Denial Of Service AI / ML Oneflow
NVD GitHub
CVSS 3.1
6.2
EPSS
0.0%
CVE-2025-71008 MEDIUM POC This Month

Oneflow versions up to 0.9.0 contains a vulnerability that allows attackers to cause a Denial of Service (DoS) via a crafted input (CVSS 6.2).

Denial Of Service AI / ML Oneflow
NVD GitHub
CVSS 3.1
6.2
EPSS
0.0%
CVE-2025-71007 HIGH POC This Week

An input validation vulnerability in the oneflow.index_add component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input. [CVSS 7.5 HIGH]

Denial Of Service AI / ML Oneflow
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2025-71006 MEDIUM POC This Month

A floating point exception (FPE) in the oneflow.reshape component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input. [CVSS 6.5 MEDIUM]

Denial Of Service AI / ML Oneflow
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-71005 MEDIUM POC This Month

A floating point exception (FPE) in the oneflow.view component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input. [CVSS 6.5 MEDIUM]

Denial Of Service AI / ML Oneflow
NVD GitHub
CVSS 3.1
6.5
EPSS
0.1%
CVE-2025-71004 MEDIUM POC This Month

A segmentation violation in the oneflow.logical_or component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input. [CVSS 6.5 MEDIUM]

Denial Of Service AI / ML Oneflow
NVD GitHub
CVSS 3.1
6.5
EPSS
0.1%
CVE-2025-71003 HIGH POC This Week

An input validation vulnerability in the flow.arange() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input. [CVSS 7.5 HIGH]

Denial Of Service AI / ML Oneflow
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2025-71002 MEDIUM POC This Month

A floating-point exception (FPE) in the flow.column_stack component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input. [CVSS 6.5 MEDIUM]

Denial Of Service AI / ML Oneflow
NVD GitHub
CVSS 3.1
6.5
EPSS
0.1%
CVE-2025-13981 MEDIUM PATCH This Month

Improper Neutralization of Input During Web Page Generation ("Cross-site Scripting") vulnerability in Drupal AI (Artificial Intelligence) allows Cross-Site Scripting (XSS).This issue affects AI (Artificial Intelligence): from 0.0.0 before 1.0.7, from 1.1.0 before 1.1.7, from 1.2.0 before 1.2.4. [CVSS 4.4 MEDIUM]

Drupal XSS AI / ML Artificial Intelligence
NVD
CVSS 3.1
4.4
EPSS
0.0%
CVE-2025-71001 MEDIUM POC This Month

A segmentation violation in the flow.column_stack component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input. [CVSS 6.5 MEDIUM]

Denial Of Service AI / ML Oneflow
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-68660 MEDIUM This Month

Discourse is an open source discussion platform. [CVSS 5.4 MEDIUM]

Authentication Bypass AI / ML Discourse
NVD GitHub
CVSS 3.1
5.4
EPSS
0.0%
CVE-2025-71000 HIGH POC This Week

An issue in the flow.cuda.BoolTensor component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input. [CVSS 7.5 HIGH]

Denial Of Service AI / ML Oneflow
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2025-70999 HIGH POC This Week

A GPU device-ID validation flaw in the flow.cuda.get_device_capability() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted device ID. [CVSS 7.5 HIGH]

Denial Of Service AI / ML Oneflow
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2025-65891 HIGH POC This Week

A GPU device-ID validation flaw in OneFlow v0.9.0 allows attackers to trigger a Denial of Dervice (DoS) by invoking flow.cuda.get_device_properties() with an invalid or negative device index. [CVSS 7.5 HIGH]

Denial Of Service AI / ML Oneflow
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2025-65890 HIGH POC This Week

A device-ID validation flaw in OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) by calling flow.cuda.synchronize() with an invalid or out-of-range GPU device index. [CVSS 7.5 HIGH]

Denial Of Service AI / ML Oneflow
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2025-65889 HIGH POC This Week

A type validation flaw in the flow.dstack() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input. [CVSS 7.5 HIGH]

Denial Of Service AI / ML Oneflow
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2025-65888 HIGH POC This Week

A dimension validation flaw in the flow.empty() component of OneFlow 0.9.0 allows attackers to cause a Denial of Service (DoS) via a negative or excessively large dimension value. [CVSS 7.5 HIGH]

Denial Of Service AI / ML Oneflow
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2025-65887 MEDIUM POC This Month

A division-by-zero vulnerability in the flow.floor_divide() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input tensor with zero. [CVSS 6.5 MEDIUM]

Denial Of Service AI / ML Oneflow
NVD GitHub
CVSS 3.1
6.5
EPSS
0.1%
CVE-2025-65886 HIGH POC This Week

A shape mismatch vulnerability in OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via supplying crafted tensor shapes. [CVSS 7.5 HIGH]

Denial Of Service AI / ML Oneflow
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-1400 HIGH This Week

Arbitrary file upload in AI Engine WordPress plugin versions up to 3.3.2 allows authenticated Editor-level users to bypass file type validation and execute remote code by uploading files through the `update_media_metadata` REST endpoint. An attacker can upload a benign image file and then rename it to PHP, placing executable code in the web-accessible uploads directory. The vulnerability affects WordPress installations with the plugin installed and requires Editor or higher privileges to exploit.

WordPress PHP RCE AI / ML
NVD
CVSS 3.1
7.2
EPSS
0.1%
CVE-2026-24779 HIGH POC PATCH This Week

vLLM before version 0.14.1 contains a server-side request forgery vulnerability in the MediaConnector class where inconsistent URL parsing between libraries allows attackers to bypass host restrictions and force the server to make arbitrary requests to internal network resources. Public exploit code exists for this vulnerability, which poses significant risk in containerized environments where a compromised vLLM instance could be leveraged to access restricted internal systems. The vulnerability affects users running vLLM's multimodal features with untrusted input.

Python Industrial SSRF Denial Of Service AI / ML +2
NVD GitHub
CVSS 3.1
7.1
EPSS
0.0%
CVE-2026-24770 CRITICAL POC PATCH Act Now

Path traversal vulnerability in RAGFlow RAG engine version 0.23.1 allows unauthenticated attackers to read arbitrary files from the server filesystem. PoC available, patch available.

RCE AI / ML Ragflow
NVD GitHub
CVSS 3.1
9.8
EPSS
0.9%
CVE-2026-24747 HIGH POC PATCH This Week

PyTorch is a Python package that provides tensor computation. [CVSS 8.8 HIGH]

Python Deserialization AI / ML Pytorch Redhat
NVD GitHub
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-0746 MEDIUM This Month

The AI Engine plugin for WordPress versions up to 3.3.2 contains a server-side request forgery vulnerability in the 'get_audio' function that allows authenticated subscribers and higher-privileged users to make arbitrary web requests from the server. When the Public API setting is enabled and allow_url_fopen is active, attackers can query and modify data on internal services accessible to the web application. No patch is currently available for this vulnerability.

WordPress SSRF AI / ML
NVD
CVSS 3.1
6.4
EPSS
0.0%
CVE-2025-33234 HIGH This Week

NVIDIA runx contains a vulnerability where an attacker could cause a code injection. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering. [CVSS 7.8 HIGH]

Denial Of Service Privilege Escalation Code Injection Information Disclosure AI / ML
NVD
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-1470 CRITICAL POC PATCH Act Now

n8n has a fifth critical RCE vulnerability (CVSS 9.9) in the Expression evaluator, enabling code execution through crafted workflow expressions.

RCE AI / ML N8n
NVD GitHub
CVSS 3.1
9.9
EPSS
0.5%
CVE-2026-24478 HIGH POC This Week

AnythingLLM versions prior to 1.10.0 contain a path traversal vulnerability in the DrupalWiki integration that allows malicious administrators or attackers with admin privileges to write arbitrary files to the server, potentially achieving remote code execution through configuration file overwriting or malicious script injection. Public exploit code exists for this vulnerability, and no patch is currently available for affected deployments. The attack requires high-level privileges but carries critical risk due to the ability to completely compromise server integrity.

Drupal RCE Path Traversal AI / ML Anythingllm
NVD GitHub
CVSS 3.1
7.2
EPSS
0.2%
CVE-2026-24477 HIGH POC This Week

Anythingllm versions up to 1.10.0 contains a vulnerability that allows attackers to complete compromise of the semantic search / retrieval functionality and indirec (CVSS 7.5).

Information Disclosure AI / ML Anythingllm
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-24123 HIGH PATCH This Week

BentoML versions prior to 1.4.34 allow path traversal attacks through improperly validated file path fields in bentofile.yaml configurations, enabling attackers to embed arbitrary files from the victim's system into bento archives during the build process. This vulnerability can be exploited to exfiltrate sensitive data such as credentials, SSH keys, and environment variables into supply chain artifacts that may be pushed to registries or deployed in production environments. A patch is available in version 1.4.34.

Python Docker Path Traversal AI / ML Bentoml
NVD GitHub
CVSS 3.1
7.4
EPSS
0.0%
CVE-2025-13374 CRITICAL Act Now

Arbitrary file upload in Kalrav AI Agent WordPress plugin due to missing file type validation in the kalrav_upload_file AJAX action.

WordPress RCE AI / ML PHP
NVD GitHub
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-24399 CRITICAL POC PATCH Act Now

Stored XSS in ChatterMate AI chatbot framework versions 1.0.8 and below. The chatbot accepts and renders malicious HTML/JavaScript from user input. PoC and patch available.

XSS AI / ML Chattermate
NVD GitHub
CVSS 3.1
9.3
EPSS
0.0%
CVE-2026-24579 MEDIUM This Month

WP Messiah Ai Image Alt Text Generator for WP ai-image-alt-text-generator-for-wp is affected by missing authorization (CVSS 4.3).

Authentication Bypass WordPress AI / ML
NVD
CVSS 3.1
4.3
EPSS
0.0%
CVE-2025-13921 MEDIUM This Month

The weDocs: AI Powered Knowledge Base, Docs, Documentation, Wiki & AI Chatbot plugin for WordPress is vulnerable to unauthorized modification or loss of data due to a missing capability check on the 'wedocs_user_documentation_handling_capabilities' function in all versions up to, and including, 2.1.16. [CVSS 4.3 MEDIUM]

WordPress AI / ML PHP
NVD
CVSS 3.1
4.3
EPSS
0.0%
CVE-2026-0773 CRITICAL Act Now

Upsonic has an insecure deserialization via cloudpickle (EPSS 1.3%) enabling remote code execution through crafted serialized AI agent data.

RCE Deserialization AI / ML
NVD
CVSS 3.0
9.8
EPSS
1.3%
CVE-2026-0772 HIGH This Week

Remote code execution in Langflow's disk cache service allows authenticated attackers to execute arbitrary code by exploiting improper deserialization of untrusted data. The vulnerability affects Langflow installations and requires valid authentication credentials to exploit, enabling attackers to gain code execution within the service account context. No patch is currently available.

RCE Deserialization AI / ML Langflow
NVD
CVSS 3.0
7.5
EPSS
0.9%
CVE-2026-0771 HIGH This Week

Langflow's PythonFunction component allows authenticated attackers with user interaction to inject and execute arbitrary Python code within application workflows, achieving remote code execution. The vulnerability affects Langflow deployments using Python-based AI/ML components, with exploitation feasibility depending on specific product configurations. No patch is currently available.

Python RCE Code Injection AI / ML Langflow
NVD
CVSS 3.0
7.1
EPSS
0.1%
CVE-2026-0770 CRITICAL Act Now

Langflow has a third RCE vulnerability via exec_globals (EPSS 10.0%) allowing inclusion of untrusted code that executes in the application's global scope.

RCE AI / ML Langflow
NVD
CVSS 3.0
9.8
EPSS
10.0%
CVE-2026-0769 CRITICAL Act Now

Langflow has an eval injection in eval_custom_component_code (EPSS 2.0%) enabling remote code execution through crafted custom component definitions.

Python RCE AI / ML Langflow
NVD
CVSS 3.0
9.8
EPSS
2.0%
CVE-2026-0768 CRITICAL Act Now

Langflow has a code injection vulnerability in the code component (EPSS 2.6%) enabling remote code execution through the visual AI workflow builder.

Python RCE Code Injection AI / ML Langflow
NVD
CVSS 3.0
9.8
EPSS
2.6%
CVE-2026-0766 HIGH This Week

Remote code execution in Open WebUI through the load_tool_module_by_id function allows authenticated attackers to execute arbitrary Python code due to insufficient input validation on user-supplied strings. An attacker with valid credentials can leverage this vulnerability to achieve code execution with service account privileges. No patch is currently available, making this a critical risk for deployed Open WebUI instances.

Python RCE Command Injection AI / ML Open Webui
NVD
CVSS 3.0
8.8
EPSS
0.6%
CVE-2026-0765 HIGH This Week

Remote code execution in Open WebUI's install_frontmatter_requirements function allows authenticated attackers to execute arbitrary commands on the host system by bypassing input validation in system call parameters. The vulnerability affects AI/ML deployments using Open WebUI and requires valid authentication credentials to exploit. No patch is currently available.

RCE Command Injection AI / ML Open Webui
NVD
CVSS 3.0
8.8
EPSS
0.6%
CVE-2026-0764 CRITICAL Act Now

GPT Academic has a second insecure deserialization vulnerability in the upload function (EPSS 1.5%) allowing remote code execution through crafted file uploads.

RCE Deserialization AI / ML Gpt Academic
NVD
CVSS 3.0
9.8
EPSS
1.5%
CVE-2026-0763 CRITICAL Act Now

GPT Academic has an insecure deserialization in run_in_subprocess_wrapper_func (EPSS 1.7%) enabling remote code execution through crafted subprocess data.

RCE Deserialization AI / ML Gpt Academic
NVD
CVSS 3.0
9.8
EPSS
1.7%
CVE-2026-0762 HIGH This Week

Remote code execution in GPT Academic's stream_daas function results from improper deserialization of untrusted data when communicating with external servers, allowing unauthenticated attackers to execute arbitrary code with root privileges. The vulnerability requires interaction with a malicious DAAS server and currently has no available patch. Organizations using GPT Academic should implement network controls to restrict connections to untrusted DAAS services until patching is available.

RCE Deserialization AI / ML Gpt Academic
NVD
CVSS 3.0
8.1
EPSS
0.5%
CVE-2026-0761 CRITICAL Act Now

MetaGPT has a code injection vulnerability in actionoutput_str_to_mapping (EPSS 2.6%) allowing remote attackers to execute arbitrary code through crafted AI agent output processing.

Python RCE Code Injection AI / ML Metagpt
NVD
CVSS 3.0
9.8
EPSS
2.6%
CVE-2026-0760 CRITICAL Act Now

MetaGPT by Foundation Agents has an insecure deserialization in deserialize_message (EPSS 1.7%) enabling remote code execution through crafted serialized data in AI agent communications.

RCE Deserialization AI / ML Metagpt
NVD
CVSS 3.0
9.8
EPSS
1.7%
CVE-2026-0759 CRITICAL Act Now

Katana Network Development Starter Kit has a command injection in executeCommand enabling remote code execution through the development framework.

RCE Command Injection AI / ML
NVD
CVSS 3.0
9.8
EPSS
1.0%
CVE-2026-0758 HIGH This Week

mcp-server-siri-shortcuts fails to validate the shortcutName parameter before using it in system calls, enabling local attackers with low-privileged code execution to inject arbitrary commands and escalate to service account privileges. This command injection vulnerability (CVE-2026-0758, CVSS 7.8) affects the AI/ML tool and currently lacks a patch. An attacker exploiting this flaw can execute arbitrary code with elevated privileges on the affected system.

Privilege Escalation Command Injection AI / ML
NVD
CVSS 3.0
7.8
EPSS
0.1%
CVE-2026-0757 HIGH This Week

MCP Manager for Claude Desktop is vulnerable to command injection through improperly validated MCP config objects, enabling remote attackers to escape the sandbox and execute arbitrary code on affected systems. The vulnerability requires user interaction such as visiting a malicious page or opening a malicious file, and currently lacks an available patch. An attacker can leverage this flaw to achieve code execution with medium integrity privileges in the context of the running process.

Command Injection AI / ML
NVD
CVSS 3.0
8.8
EPSS
0.1%
CVE-2026-0756 CRITICAL Act Now

github-kanban-mcp-server has a command injection in execAsync (EPSS 1.0%) enabling remote code execution on developer machines using the GitHub Kanban MCP integration.

Github RCE Command Injection AI / ML
NVD
CVSS 3.0
9.8
EPSS
1.0%
CVE-2026-0755 CRITICAL Act Now

gemini-mcp-tool has a command injection in execAsync allowing remote code execution on systems using the Gemini AI MCP integration.

RCE Command Injection AI / ML
NVD
CVSS 3.0
9.8
EPSS
0.5%
CVE-2025-15063 CRITICAL Act Now

Ollama MCP Server has a command injection vulnerability in execAsync (EPSS 1.0%) allowing remote attackers to execute arbitrary commands on systems running the Ollama AI integration.

RCE Command Injection AI / ML Ollama
NVD
CVSS 3.0
9.8
EPSS
1.0%
CVE-2025-15061 CRITICAL PATCH Act Now

Framelink Figma MCP Server has a command injection vulnerability in fetchWithRetry (EPSS 1.4%) enabling remote code execution on developer machines using the MCP integration.

RCE Command Injection AI / ML
NVD GitHub
CVSS 3.0
9.8
EPSS
1.4%
CVE-2026-21521 HIGH This Week

Information disclosure in Microsoft 365 Word Copilot enables unauthenticated attackers to extract sensitive data through improper handling of escape and control sequences in network communications. The vulnerability requires user interaction to trigger and affects the Copilot AI/ML service with a CVSS score of 7.4. No patch is currently available.

Information Disclosure AI / ML 365 Word Copilot
NVD
CVSS 3.1
7.4
EPSS
0.1%
CVE-2026-21520 HIGH This Week

Unauthenticated attackers can remotely access sensitive information in Microsoft Copilot Studio due to improper access controls, requiring no authentication or user interaction. This network-based vulnerability exposes confidential data to unauthorized disclosure with no patch currently available.

Command Injection AI / ML Copilot Studio
NVD
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-1260 HIGH PATCH This Week

Sentencepiece versions below 0.2.1 are vulnerable to memory corruption when processing specially crafted model files, allowing local authenticated attackers to crash the application or potentially execute arbitrary code. This vulnerability requires a malicious model file that deviates from standard training procedures, affecting AI/ML applications that use vulnerable Sentencepiece libraries. No patch is currently available.

Buffer Overflow AI / ML Sentencepiece Redhat
NVD GitHub
CVSS 3.1
7.8
EPSS
0.0%
CVE-2025-65098 HIGH POC PATCH This Week

Typebot is an open-source chatbot builder. In versions prior to 3.13.2, client-side script execution in Typebot allows stealing all stored credentials from any user. [CVSS 7.4 HIGH]

AI / ML Typebot
NVD GitHub
CVSS 3.1
7.4
EPSS
0.0%
CVE-2026-24055 MEDIUM POC PATCH This Month

Langfuse versions 3.146.0 and below allow unauthenticated attackers to hijack Slack OAuth integrations by injecting arbitrary projectIds into the /api/public/slack/install endpoint, enabling them to bind malicious Slack workspaces to any project and intercept prompt management data. An attacker can replace existing Prompt Slack Automations or pre-register malicious integrations that execute when authenticated users unknowingly configure them. Public exploit code exists for this vulnerability, which affects the DNS and AI/ML components of the Langfuse platform.

Dns AI / ML Langfuse
NVD GitHub
CVSS 3.1
5.3
EPSS
0.0%
CVE-2026-24002 CRITICAL PATCH Act Now

Grist spreadsheet software has an injection vulnerability in Python formula execution that allows authenticated users to escape the formula sandbox and execute arbitrary code.

Python AI / ML Grist Core
NVD GitHub
CVSS 3.1
9.0
EPSS
0.0%
CVE-2026-23526 HIGH PATCH This Week

CVAT is an open source interactive video and image annotation tool for computer vision. [CVSS 8.8 HIGH]

Information Disclosure AI / ML Computer Vision Annotation Tool
NVD GitHub
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-23516 MEDIUM PATCH This Month

CVAT is an open source interactive video and image annotation tool for computer vision. [CVSS 5.4 MEDIUM]

RCE AI / ML Computer Vision Annotation Tool
NVD GitHub
CVSS 3.1
5.4
EPSS
0.0%
CVE-2026-22807 HIGH PATCH This Week

vLLM is an inference and serving engine for large language models (LLMs). [CVSS 8.8 HIGH]

Python AI / ML Vllm Hugging Face Redhat
NVD GitHub
CVSS 3.1
8.8
EPSS
0.1%
CVE-2026-21852 HIGH PATCH This Week

Claude Code versions prior to 2.0.65 allow attackers to steal Anthropic API keys from users by crafting malicious repositories that redirect API calls to attacker-controlled servers before the trust confirmation dialog appears. When a victim opens an infected repository, the tool automatically reads malicious configuration settings and sends API requests containing credentials before displaying any security prompt, enabling credential theft. Users should upgrade to version 2.0.65 or later, though auto-update users have already received the patch.

Authentication Bypass AI / ML Claude Code
NVD GitHub VulDB
CVSS 3.1
7.5
EPSS
0.0%
CVE-2025-69285 MEDIUM POC This Month

SQLBot is an intelligent data query system based on a large language model and RAG. [CVSS 6.1 MEDIUM]

PostgreSQL AI / ML Sqlbot
NVD GitHub
CVSS 3.1
6.1
EPSS
0.1%
CVE-2025-66960 HIGH POC This Week

An issue in ollama v.0.12.10 allows a remote attacker to cause a denial of service via the fs/ggml/gguf.go, function readGGUFV1String reads a string length from untrusted GGUF metadata [CVSS 7.5 HIGH]

Denial Of Service AI / ML Ollama Redhat Suse
NVD GitHub
CVSS 3.1
7.5
EPSS
0.3%
CVE-2025-66959 HIGH POC This Week

An issue in ollama v.0.12.10 allows a remote attacker to cause a denial of service via the GGUF decoder [CVSS 7.5 HIGH]

Denial Of Service AI / ML Ollama Redhat Suse
NVD GitHub
CVSS 3.1
7.5
EPSS
0.3%
CVE-2025-56005 CRITICAL POC PATCH Act Now

PLY (Python Lex-Yacc) library 3.11 has an unsafe feature enabling remote code execution through pickle deserialization of cached parser tables, with EPSS 0.91%.

Python Github RCE Deserialization AI / ML +3
NVD GitHub
CVSS 3.1
9.8
EPSS
0.9%
CVE-2025-33233 HIGH This Week

NVIDIA Merlin Transformers4Rec for all platforms contains a vulnerability where an attacker could cause code injection. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering. [CVSS 7.8 HIGH]

Privilege Escalation Code Injection Information Disclosure AI / ML
NVD
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-22219 HIGH POC PATCH This Week

Chainlit versions before 2.9.4 with SQLAlchemy backend contain a server-side request forgery vulnerability in the project element update endpoint that allows authenticated attackers to make arbitrary HTTP requests from the server. Public exploit code exists for this vulnerability, enabling attackers to reach internal network services, cloud metadata endpoints, and store responses through the configured storage system. The vulnerability affects AI/ML applications using vulnerable Chainlit deployments and currently has no available patch.

SSRF AI / ML Chainlit
NVD GitHub
CVSS 3.1
7.7
EPSS
0.0%
CVE-2026-22218 MEDIUM POC This Month

Authenticated users in Chainlit versions before 2.9.4 can read arbitrary files accessible to the Chainlit service through a path traversal flaw in the element update endpoint. By crafting a malicious Element with a custom path, an attacker retrieves file contents via the /project/file API, enabling disclosure of sensitive data. Public exploit code exists for this vulnerability and no patch is currently available.

Path Traversal AI / ML Chainlit
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-23875 MEDIUM POC PATCH This Month

Improper permission validation in CrawlChat versions prior to 0.0.8 allows unauthenticated Discord guild members to inject malicious content into the bot's knowledge base through the jigsaw emoji feature, enabling attackers to manipulate chatbot responses across all integrations and redirect users to malicious sites. The vulnerability affects the AI/ML platform's ability to maintain knowledge base integrity, as normal users can bypass intended admin-only controls. Public exploit code exists for this issue, though a patch is available.

Authentication Bypass AI / ML Crawlchat
NVD GitHub
CVSS 3.1
5.4
EPSS
0.0%
CVE-2026-23842 HIGH POC PATCH This Week

ChatterBot versions through 1.2.10 suffer from denial-of-service vulnerabilities due to improper connection pool management that allows attackers to exhaust database connections through concurrent requests to the get_response() method, causing persistent service unavailability. Public exploit code exists for this vulnerability, which affects all deployments of the affected ChatterBot versions and requires manual service restart to recover. ChatterBot 1.2.11 addresses this issue.

Denial Of Service AI / ML Chatterbot
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-23733 MEDIUM This Month

Stored XSS in LobeChat's Mermaid artifact renderer prior to version 2.0.0-next.180 enables attackers to execute arbitrary JavaScript, which can be escalated to remote code execution through the exposed electronAPI IPC bridge to run system commands. This affects users of the open source chat platform running vulnerable versions, requiring local interaction and high privileges to exploit but resulting in full system compromise. No patch is currently available.

RCE XSS AI / ML
NVD GitHub
CVSS 3.1
6.4
EPSS
0.1%
CVE-2026-0863 HIGH POC PATCH This Week

Authenticated users can exploit string formatting and exception handling in n8n's Python task executor to escape sandbox restrictions and execute arbitrary code on the underlying operating system, with full instance takeover possible in Internal execution mode. Public exploit code exists for this vulnerability, which affects n8n deployments running under Internal execution mode where the Python executor has direct OS access. External execution mode deployments using Docker sidecars have reduced impact as code execution is confined to the container rather than the main node.

Python Docker AI / ML N8n
NVD GitHub
CVSS 3.1
8.5
EPSS
0.0%
CVE-2026-23744 CRITICAL PATCH Act Now

MCPJam Inspector versions 1.4.2 and earlier allow unauthenticated remote code execution through missing authentication in the MCP server debugging platform, with EPSS 17.2% indicating active scanning.

RCE Authentication Bypass AI / ML Inspector
NVD GitHub VulDB
CVSS 3.1
9.8
EPSS
17.2%
CVE-2026-23528 MEDIUM PATCH This Month

Dask distributed is a distributed task scheduler for Dask. [CVSS 6.1 MEDIUM]

Linux Python AI / ML Dask
NVD GitHub
CVSS 3.1
6.1
EPSS
0.0%
CVE-2026-23523 CRITICAL POC PATCH Act Now

Dive, an MCP Host Desktop Application for LLM integration, allows code injection prior to version 0.13.0 through malicious tool responses, enabling attackers to execute arbitrary code on the user's machine.

RCE Code Injection AI / ML Dive
NVD GitHub
CVSS 3.1
9.6
EPSS
0.0%
CVE-2026-0616 HIGH This Week

TheLibrarian's web_fetch tool can expose the Adminer interface, enabling unauthenticated remote attackers to obtain credentials for the internal backend system. This high-severity vulnerability affects AI/ML deployments and TheLibrarian installations, with no patch currently available. An attacker with network access could leverage the exposed interface to gain unauthorized administrative access to the backend infrastructure.

Information Disclosure AI / ML The Librarian
NVD
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-0615 HIGH This Week

The Librarian's web_fetch tool can access the supervisord status page, exposing information about running backend processes to unauthenticated remote attackers. This information disclosure vulnerability (CVSS 7.3) affects AI/ML deployments and could enable attackers to map internal service architecture and identify targets for further exploitation. No patch is currently available for this vulnerability.

Information Disclosure AI / ML The Librarian
NVD
CVSS 3.1
7.3
EPSS
0.0%
CVE-2026-0613 HIGH This Week

The Librarian's web_fetch tool can be exploited via SSRF to perform unauthorized GET requests against internal IP addresses and cloud services within the Hertzner environment, allowing attackers to conduct port scanning and reconnaissance of the infrastructure. This unauthenticated network-based attack requires no user interaction and could expose sensitive internal services and their configurations. While the vendor has released patches, exploitation remains possible on unpatched instances.

SSRF AI / ML The Librarian
NVD
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-0612 HIGH This Week

The Librarian's web_fetch tool permits attackers to retrieve arbitrary external content and proxy requests through the application's infrastructure without authentication, resulting in information disclosure. This network-accessible vulnerability affects all versions of The Librarian AI/ML product and has high severity due to its ease of exploitation and potential for infrastructure abuse. A vendor patch is currently unavailable.

Information Disclosure AI / ML The Librarian
NVD
CVSS 3.1
7.5
EPSS
0.0%
CVE-2025-14384 MEDIUM This Month

The All in One SEO - Powerful SEO Plugin to Boost SEO Rankings & Increase Traffic plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the `/aioseo/v1/ai/credits` REST route in all versions up to, and including, 4.9.2. [CVSS 4.3 MEDIUM]

WordPress AI / ML PHP
NVD
CVSS 3.1
4.3
EPSS
0.0%
CVE-2025-65368 MEDIUM POC This Month

SparkyFitness v0.15.8.2 is vulnerable to Cross Site Scripting (XSS) via user input and LLM output. [CVSS 6.1 MEDIUM]

XSS AI / ML Sparkyfitness
NVD GitHub
CVSS 3.1
6.1
EPSS
0.0%
CVE-2024-4147
EPSS 0% CVSS 6.5
MEDIUM POC This Month

Lunary contains a vulnerability that allows attackers to delete prompts created in other organizations through ID manipulation (CVSS 6.5).

Authentication Bypass AI / ML Lunary
NVD GitHub
CVE-2024-2356
EPSS 0% CVSS 9.6
CRITICAL Act Now

Local File Inclusion in parisneo/lollms-webui /reinstall_extension endpoint allows authenticated users to include arbitrary local files. EPSS 0.26%.

Python RCE Lfi +1
NVD GitHub
CVE-2026-1117
EPSS 0% CVSS 8.2
HIGH PATCH This Week

Unauthenticated clients can invoke resource-intensive Socket.IO events in lollms 5.9.0 due to missing authentication checks in the event handler registration, allowing attackers to trigger denial of service and state corruption. The vulnerability is compounded by improper use of global state flags in multi-client environments, enabling attackers to interfere with legitimate client operations and manipulate server state through race conditions. No patch is currently available for this high-severity flaw affecting the AI/ML framework.

Denial Of Service Race Condition AI / ML
NVD GitHub
CVE-2026-25130
EPSS 0% CVSS 9.6
CRITICAL Act Now

Multiple command injection vulnerabilities in CAI (Cybersecurity AI) framework up to 0.5.10 allow OS command execution through the security testing platform.

RCE AI / ML
NVD GitHub
CVE-2025-69662
EPSS 0% CVSS 8.6
HIGH POC PATCH This Week

SQL injection vulnerability in geopandas before v.1.1.2 allows an attacker to obtain sensitive information via the to_postgis()` function being used to write GeoDataFrames to a PostgreSQL database. [CVSS 8.6 HIGH]

PostgreSQL SQLi AI / ML +2
NVD GitHub
CVE-2026-24780
EPSS 0% CVSS 8.8
HIGH POC This Week

Remote code execution in AutoGPT Platform prior to v0.6.44 allows authenticated users to execute disabled blocks and write arbitrary Python code to the server filesystem. The vulnerability stems from insufficient validation of the disabled flag in block execution endpoints, enabling attackers to achieve code execution via the BlockInstallationBlock component. Public exploit code exists, and self-hosted instances with Supabase signup enabled are particularly vulnerable to account creation and exploitation.

Python RCE AI / ML +1
NVD GitHub
CVE-2025-71011
EPSS 0% CVSS 6.2
MEDIUM POC This Month

An input validation vulnerability in the flow.Tensor.new_empty/flow.Tensor.new_ones/flow.Tensor.new_zeros component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input. [CVSS 6.2 MEDIUM]

Denial Of Service AI / ML Oneflow
NVD GitHub
CVE-2025-71009
EPSS 0% CVSS 6.2
MEDIUM POC This Month

An input validation vulnerability in the flow.scatter/flow.scatter_add component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted indices. [CVSS 6.2 MEDIUM]

Denial Of Service AI / ML Oneflow
NVD GitHub
CVE-2025-71008
EPSS 0% CVSS 6.2
MEDIUM POC This Month

Oneflow versions up to 0.9.0 contains a vulnerability that allows attackers to cause a Denial of Service (DoS) via a crafted input (CVSS 6.2).

Denial Of Service AI / ML Oneflow
NVD GitHub
CVE-2025-71007
EPSS 0% CVSS 7.5
HIGH POC This Week

An input validation vulnerability in the oneflow.index_add component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input. [CVSS 7.5 HIGH]

Denial Of Service AI / ML Oneflow
NVD GitHub
CVE-2025-71006
EPSS 0% CVSS 6.5
MEDIUM POC This Month

A floating point exception (FPE) in the oneflow.reshape component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input. [CVSS 6.5 MEDIUM]

Denial Of Service AI / ML Oneflow
NVD GitHub
CVE-2025-71005
EPSS 0% CVSS 6.5
MEDIUM POC This Month

A floating point exception (FPE) in the oneflow.view component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input. [CVSS 6.5 MEDIUM]

Denial Of Service AI / ML Oneflow
NVD GitHub
CVE-2025-71004
EPSS 0% CVSS 6.5
MEDIUM POC This Month

A segmentation violation in the oneflow.logical_or component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input. [CVSS 6.5 MEDIUM]

Denial Of Service AI / ML Oneflow
NVD GitHub
CVE-2025-71003
EPSS 0% CVSS 7.5
HIGH POC This Week

An input validation vulnerability in the flow.arange() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input. [CVSS 7.5 HIGH]

Denial Of Service AI / ML Oneflow
NVD GitHub
CVE-2025-71002
EPSS 0% CVSS 6.5
MEDIUM POC This Month

A floating-point exception (FPE) in the flow.column_stack component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input. [CVSS 6.5 MEDIUM]

Denial Of Service AI / ML Oneflow
NVD GitHub
CVE-2025-13981
EPSS 0% CVSS 4.4
MEDIUM PATCH This Month

Improper Neutralization of Input During Web Page Generation ("Cross-site Scripting") vulnerability in Drupal AI (Artificial Intelligence) allows Cross-Site Scripting (XSS).This issue affects AI (Artificial Intelligence): from 0.0.0 before 1.0.7, from 1.1.0 before 1.1.7, from 1.2.0 before 1.2.4. [CVSS 4.4 MEDIUM]

Drupal XSS AI / ML +1
NVD
CVE-2025-71001
EPSS 0% CVSS 6.5
MEDIUM POC This Month

A segmentation violation in the flow.column_stack component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input. [CVSS 6.5 MEDIUM]

Denial Of Service AI / ML Oneflow
NVD GitHub
CVE-2025-68660
EPSS 0% CVSS 5.4
MEDIUM This Month

Discourse is an open source discussion platform. [CVSS 5.4 MEDIUM]

Authentication Bypass AI / ML Discourse
NVD GitHub
CVE-2025-71000
EPSS 0% CVSS 7.5
HIGH POC This Week

An issue in the flow.cuda.BoolTensor component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input. [CVSS 7.5 HIGH]

Denial Of Service AI / ML Oneflow
NVD GitHub
CVE-2025-70999
EPSS 0% CVSS 7.5
HIGH POC This Week

A GPU device-ID validation flaw in the flow.cuda.get_device_capability() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted device ID. [CVSS 7.5 HIGH]

Denial Of Service AI / ML Oneflow
NVD GitHub
CVE-2025-65891
EPSS 0% CVSS 7.5
HIGH POC This Week

A GPU device-ID validation flaw in OneFlow v0.9.0 allows attackers to trigger a Denial of Dervice (DoS) by invoking flow.cuda.get_device_properties() with an invalid or negative device index. [CVSS 7.5 HIGH]

Denial Of Service AI / ML Oneflow
NVD GitHub
CVE-2025-65890
EPSS 0% CVSS 7.5
HIGH POC This Week

A device-ID validation flaw in OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) by calling flow.cuda.synchronize() with an invalid or out-of-range GPU device index. [CVSS 7.5 HIGH]

Denial Of Service AI / ML Oneflow
NVD GitHub
CVE-2025-65889
EPSS 0% CVSS 7.5
HIGH POC This Week

A type validation flaw in the flow.dstack() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input. [CVSS 7.5 HIGH]

Denial Of Service AI / ML Oneflow
NVD GitHub
CVE-2025-65888
EPSS 0% CVSS 7.5
HIGH POC This Week

A dimension validation flaw in the flow.empty() component of OneFlow 0.9.0 allows attackers to cause a Denial of Service (DoS) via a negative or excessively large dimension value. [CVSS 7.5 HIGH]

Denial Of Service AI / ML Oneflow
NVD GitHub
CVE-2025-65887
EPSS 0% CVSS 6.5
MEDIUM POC This Month

A division-by-zero vulnerability in the flow.floor_divide() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input tensor with zero. [CVSS 6.5 MEDIUM]

Denial Of Service AI / ML Oneflow
NVD GitHub
CVE-2025-65886
EPSS 0% CVSS 7.5
HIGH POC This Week

A shape mismatch vulnerability in OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via supplying crafted tensor shapes. [CVSS 7.5 HIGH]

Denial Of Service AI / ML Oneflow
NVD GitHub
CVE-2026-1400
EPSS 0% CVSS 7.2
HIGH This Week

Arbitrary file upload in AI Engine WordPress plugin versions up to 3.3.2 allows authenticated Editor-level users to bypass file type validation and execute remote code by uploading files through the `update_media_metadata` REST endpoint. An attacker can upload a benign image file and then rename it to PHP, placing executable code in the web-accessible uploads directory. The vulnerability affects WordPress installations with the plugin installed and requires Editor or higher privileges to exploit.

WordPress PHP RCE +1
NVD
CVE-2026-24779
EPSS 0% CVSS 7.1
HIGH POC PATCH This Week

vLLM before version 0.14.1 contains a server-side request forgery vulnerability in the MediaConnector class where inconsistent URL parsing between libraries allows attackers to bypass host restrictions and force the server to make arbitrary requests to internal network resources. Public exploit code exists for this vulnerability, which poses significant risk in containerized environments where a compromised vLLM instance could be leveraged to access restricted internal systems. The vulnerability affects users running vLLM's multimodal features with untrusted input.

Python Industrial SSRF +4
NVD GitHub
CVE-2026-24770
EPSS 1% CVSS 9.8
CRITICAL POC PATCH Act Now

Path traversal vulnerability in RAGFlow RAG engine version 0.23.1 allows unauthenticated attackers to read arbitrary files from the server filesystem. PoC available, patch available.

RCE AI / ML Ragflow
NVD GitHub
CVE-2026-24747
EPSS 0% CVSS 8.8
HIGH POC PATCH This Week

PyTorch is a Python package that provides tensor computation. [CVSS 8.8 HIGH]

Python Deserialization AI / ML +2
NVD GitHub
CVE-2026-0746
EPSS 0% CVSS 6.4
MEDIUM This Month

The AI Engine plugin for WordPress versions up to 3.3.2 contains a server-side request forgery vulnerability in the 'get_audio' function that allows authenticated subscribers and higher-privileged users to make arbitrary web requests from the server. When the Public API setting is enabled and allow_url_fopen is active, attackers can query and modify data on internal services accessible to the web application. No patch is currently available for this vulnerability.

WordPress SSRF AI / ML
NVD
CVE-2025-33234
EPSS 0% CVSS 7.8
HIGH This Week

NVIDIA runx contains a vulnerability where an attacker could cause a code injection. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering. [CVSS 7.8 HIGH]

Denial Of Service Privilege Escalation Code Injection +2
NVD
CVE-2026-1470
EPSS 0% CVSS 9.9
CRITICAL POC PATCH Act Now

n8n has a fifth critical RCE vulnerability (CVSS 9.9) in the Expression evaluator, enabling code execution through crafted workflow expressions.

RCE AI / ML N8n
NVD GitHub
CVE-2026-24478
EPSS 0% CVSS 7.2
HIGH POC This Week

AnythingLLM versions prior to 1.10.0 contain a path traversal vulnerability in the DrupalWiki integration that allows malicious administrators or attackers with admin privileges to write arbitrary files to the server, potentially achieving remote code execution through configuration file overwriting or malicious script injection. Public exploit code exists for this vulnerability, and no patch is currently available for affected deployments. The attack requires high-level privileges but carries critical risk due to the ability to completely compromise server integrity.

Drupal RCE Path Traversal +2
NVD GitHub
CVE-2026-24477
EPSS 0% CVSS 7.5
HIGH POC This Week

Anythingllm versions up to 1.10.0 contains a vulnerability that allows attackers to complete compromise of the semantic search / retrieval functionality and indirec (CVSS 7.5).

Information Disclosure AI / ML Anythingllm
NVD GitHub
CVE-2026-24123
EPSS 0% CVSS 7.4
HIGH PATCH This Week

BentoML versions prior to 1.4.34 allow path traversal attacks through improperly validated file path fields in bentofile.yaml configurations, enabling attackers to embed arbitrary files from the victim's system into bento archives during the build process. This vulnerability can be exploited to exfiltrate sensitive data such as credentials, SSH keys, and environment variables into supply chain artifacts that may be pushed to registries or deployed in production environments. A patch is available in version 1.4.34.

Python Docker Path Traversal +2
NVD GitHub
CVE-2025-13374
EPSS 0% CVSS 9.8
CRITICAL Act Now

Arbitrary file upload in Kalrav AI Agent WordPress plugin due to missing file type validation in the kalrav_upload_file AJAX action.

WordPress RCE AI / ML +1
NVD GitHub
CVE-2026-24399
EPSS 0% CVSS 9.3
CRITICAL POC PATCH Act Now

Stored XSS in ChatterMate AI chatbot framework versions 1.0.8 and below. The chatbot accepts and renders malicious HTML/JavaScript from user input. PoC and patch available.

XSS AI / ML Chattermate
NVD GitHub
CVE-2026-24579
EPSS 0% CVSS 4.3
MEDIUM This Month

WP Messiah Ai Image Alt Text Generator for WP ai-image-alt-text-generator-for-wp is affected by missing authorization (CVSS 4.3).

Authentication Bypass WordPress AI / ML
NVD
CVE-2025-13921
EPSS 0% CVSS 4.3
MEDIUM This Month

The weDocs: AI Powered Knowledge Base, Docs, Documentation, Wiki & AI Chatbot plugin for WordPress is vulnerable to unauthorized modification or loss of data due to a missing capability check on the 'wedocs_user_documentation_handling_capabilities' function in all versions up to, and including, 2.1.16. [CVSS 4.3 MEDIUM]

WordPress AI / ML PHP
NVD
CVE-2026-0773
EPSS 1% CVSS 9.8
CRITICAL Act Now

Upsonic has an insecure deserialization via cloudpickle (EPSS 1.3%) enabling remote code execution through crafted serialized AI agent data.

RCE Deserialization AI / ML
NVD
CVE-2026-0772
EPSS 1% CVSS 7.5
HIGH This Week

Remote code execution in Langflow's disk cache service allows authenticated attackers to execute arbitrary code by exploiting improper deserialization of untrusted data. The vulnerability affects Langflow installations and requires valid authentication credentials to exploit, enabling attackers to gain code execution within the service account context. No patch is currently available.

RCE Deserialization AI / ML +1
NVD
CVE-2026-0771
EPSS 0% CVSS 7.1
HIGH This Week

Langflow's PythonFunction component allows authenticated attackers with user interaction to inject and execute arbitrary Python code within application workflows, achieving remote code execution. The vulnerability affects Langflow deployments using Python-based AI/ML components, with exploitation feasibility depending on specific product configurations. No patch is currently available.

Python RCE Code Injection +2
NVD
CVE-2026-0770
EPSS 10% CVSS 9.8
CRITICAL Act Now

Langflow has a third RCE vulnerability via exec_globals (EPSS 10.0%) allowing inclusion of untrusted code that executes in the application's global scope.

RCE AI / ML Langflow
NVD
CVE-2026-0769
EPSS 2% CVSS 9.8
CRITICAL Act Now

Langflow has an eval injection in eval_custom_component_code (EPSS 2.0%) enabling remote code execution through crafted custom component definitions.

Python RCE AI / ML +1
NVD
CVE-2026-0768
EPSS 3% CVSS 9.8
CRITICAL Act Now

Langflow has a code injection vulnerability in the code component (EPSS 2.6%) enabling remote code execution through the visual AI workflow builder.

Python RCE Code Injection +2
NVD
CVE-2026-0766
EPSS 1% CVSS 8.8
HIGH This Week

Remote code execution in Open WebUI through the load_tool_module_by_id function allows authenticated attackers to execute arbitrary Python code due to insufficient input validation on user-supplied strings. An attacker with valid credentials can leverage this vulnerability to achieve code execution with service account privileges. No patch is currently available, making this a critical risk for deployed Open WebUI instances.

Python RCE Command Injection +2
NVD
CVE-2026-0765
EPSS 1% CVSS 8.8
HIGH This Week

Remote code execution in Open WebUI's install_frontmatter_requirements function allows authenticated attackers to execute arbitrary commands on the host system by bypassing input validation in system call parameters. The vulnerability affects AI/ML deployments using Open WebUI and requires valid authentication credentials to exploit. No patch is currently available.

RCE Command Injection AI / ML +1
NVD
CVE-2026-0764
EPSS 2% CVSS 9.8
CRITICAL Act Now

GPT Academic has a second insecure deserialization vulnerability in the upload function (EPSS 1.5%) allowing remote code execution through crafted file uploads.

RCE Deserialization AI / ML +1
NVD
CVE-2026-0763
EPSS 2% CVSS 9.8
CRITICAL Act Now

GPT Academic has an insecure deserialization in run_in_subprocess_wrapper_func (EPSS 1.7%) enabling remote code execution through crafted subprocess data.

RCE Deserialization AI / ML +1
NVD
CVE-2026-0762
EPSS 0% CVSS 8.1
HIGH This Week

Remote code execution in GPT Academic's stream_daas function results from improper deserialization of untrusted data when communicating with external servers, allowing unauthenticated attackers to execute arbitrary code with root privileges. The vulnerability requires interaction with a malicious DAAS server and currently has no available patch. Organizations using GPT Academic should implement network controls to restrict connections to untrusted DAAS services until patching is available.

RCE Deserialization AI / ML +1
NVD
CVE-2026-0761
EPSS 3% CVSS 9.8
CRITICAL Act Now

MetaGPT has a code injection vulnerability in actionoutput_str_to_mapping (EPSS 2.6%) allowing remote attackers to execute arbitrary code through crafted AI agent output processing.

Python RCE Code Injection +2
NVD
CVE-2026-0760
EPSS 2% CVSS 9.8
CRITICAL Act Now

MetaGPT by Foundation Agents has an insecure deserialization in deserialize_message (EPSS 1.7%) enabling remote code execution through crafted serialized data in AI agent communications.

RCE Deserialization AI / ML +1
NVD
CVE-2026-0759
EPSS 1% CVSS 9.8
CRITICAL Act Now

Katana Network Development Starter Kit has a command injection in executeCommand enabling remote code execution through the development framework.

RCE Command Injection AI / ML
NVD
CVE-2026-0758
EPSS 0% CVSS 7.8
HIGH This Week

mcp-server-siri-shortcuts fails to validate the shortcutName parameter before using it in system calls, enabling local attackers with low-privileged code execution to inject arbitrary commands and escalate to service account privileges. This command injection vulnerability (CVE-2026-0758, CVSS 7.8) affects the AI/ML tool and currently lacks a patch. An attacker exploiting this flaw can execute arbitrary code with elevated privileges on the affected system.

Privilege Escalation Command Injection AI / ML
NVD
CVE-2026-0757
EPSS 0% CVSS 8.8
HIGH This Week

MCP Manager for Claude Desktop is vulnerable to command injection through improperly validated MCP config objects, enabling remote attackers to escape the sandbox and execute arbitrary code on affected systems. The vulnerability requires user interaction such as visiting a malicious page or opening a malicious file, and currently lacks an available patch. An attacker can leverage this flaw to achieve code execution with medium integrity privileges in the context of the running process.

Command Injection AI / ML
NVD
CVE-2026-0756
EPSS 1% CVSS 9.8
CRITICAL Act Now

github-kanban-mcp-server has a command injection in execAsync (EPSS 1.0%) enabling remote code execution on developer machines using the GitHub Kanban MCP integration.

Github RCE Command Injection +1
NVD
CVE-2026-0755
EPSS 1% CVSS 9.8
CRITICAL Act Now

gemini-mcp-tool has a command injection in execAsync allowing remote code execution on systems using the Gemini AI MCP integration.

RCE Command Injection AI / ML
NVD
CVE-2025-15063
EPSS 1% CVSS 9.8
CRITICAL Act Now

Ollama MCP Server has a command injection vulnerability in execAsync (EPSS 1.0%) allowing remote attackers to execute arbitrary commands on systems running the Ollama AI integration.

RCE Command Injection AI / ML +1
NVD
CVE-2025-15061
EPSS 1% CVSS 9.8
CRITICAL PATCH Act Now

Framelink Figma MCP Server has a command injection vulnerability in fetchWithRetry (EPSS 1.4%) enabling remote code execution on developer machines using the MCP integration.

RCE Command Injection AI / ML
NVD GitHub
CVE-2026-21521
EPSS 0% CVSS 7.4
HIGH This Week

Information disclosure in Microsoft 365 Word Copilot enables unauthenticated attackers to extract sensitive data through improper handling of escape and control sequences in network communications. The vulnerability requires user interaction to trigger and affects the Copilot AI/ML service with a CVSS score of 7.4. No patch is currently available.

Information Disclosure AI / ML 365 Word Copilot
NVD
CVE-2026-21520
EPSS 0% CVSS 7.5
HIGH This Week

Unauthenticated attackers can remotely access sensitive information in Microsoft Copilot Studio due to improper access controls, requiring no authentication or user interaction. This network-based vulnerability exposes confidential data to unauthorized disclosure with no patch currently available.

Command Injection AI / ML Copilot Studio
NVD
CVE-2026-1260
EPSS 0% CVSS 7.8
HIGH PATCH This Week

Sentencepiece versions below 0.2.1 are vulnerable to memory corruption when processing specially crafted model files, allowing local authenticated attackers to crash the application or potentially execute arbitrary code. This vulnerability requires a malicious model file that deviates from standard training procedures, affecting AI/ML applications that use vulnerable Sentencepiece libraries. No patch is currently available.

Buffer Overflow AI / ML Sentencepiece +1
NVD GitHub
CVE-2025-65098
EPSS 0% CVSS 7.4
HIGH POC PATCH This Week

Typebot is an open-source chatbot builder. In versions prior to 3.13.2, client-side script execution in Typebot allows stealing all stored credentials from any user. [CVSS 7.4 HIGH]

AI / ML Typebot
NVD GitHub
CVE-2026-24055
EPSS 0% CVSS 5.3
MEDIUM POC PATCH This Month

Langfuse versions 3.146.0 and below allow unauthenticated attackers to hijack Slack OAuth integrations by injecting arbitrary projectIds into the /api/public/slack/install endpoint, enabling them to bind malicious Slack workspaces to any project and intercept prompt management data. An attacker can replace existing Prompt Slack Automations or pre-register malicious integrations that execute when authenticated users unknowingly configure them. Public exploit code exists for this vulnerability, which affects the DNS and AI/ML components of the Langfuse platform.

Dns AI / ML Langfuse
NVD GitHub
CVE-2026-24002
EPSS 0% CVSS 9.0
CRITICAL PATCH Act Now

Grist spreadsheet software has an injection vulnerability in Python formula execution that allows authenticated users to escape the formula sandbox and execute arbitrary code.

Python AI / ML Grist Core
NVD GitHub
CVE-2026-23526
EPSS 0% CVSS 8.8
HIGH PATCH This Week

CVAT is an open source interactive video and image annotation tool for computer vision. [CVSS 8.8 HIGH]

Information Disclosure AI / ML Computer Vision Annotation Tool
NVD GitHub
CVE-2026-23516
EPSS 0% CVSS 5.4
MEDIUM PATCH This Month

CVAT is an open source interactive video and image annotation tool for computer vision. [CVSS 5.4 MEDIUM]

RCE AI / ML Computer Vision Annotation Tool
NVD GitHub
CVE-2026-22807
EPSS 0% CVSS 8.8
HIGH PATCH This Week

vLLM is an inference and serving engine for large language models (LLMs). [CVSS 8.8 HIGH]

Python AI / ML Vllm +2
NVD GitHub
CVE-2026-21852
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Claude Code versions prior to 2.0.65 allow attackers to steal Anthropic API keys from users by crafting malicious repositories that redirect API calls to attacker-controlled servers before the trust confirmation dialog appears. When a victim opens an infected repository, the tool automatically reads malicious configuration settings and sends API requests containing credentials before displaying any security prompt, enabling credential theft. Users should upgrade to version 2.0.65 or later, though auto-update users have already received the patch.

Authentication Bypass AI / ML Claude Code
NVD GitHub VulDB
CVE-2025-69285
EPSS 0% CVSS 6.1
MEDIUM POC This Month

SQLBot is an intelligent data query system based on a large language model and RAG. [CVSS 6.1 MEDIUM]

PostgreSQL AI / ML Sqlbot
NVD GitHub
CVE-2025-66960
EPSS 0% CVSS 7.5
HIGH POC This Week

An issue in ollama v.0.12.10 allows a remote attacker to cause a denial of service via the fs/ggml/gguf.go, function readGGUFV1String reads a string length from untrusted GGUF metadata [CVSS 7.5 HIGH]

Denial Of Service AI / ML Ollama +2
NVD GitHub
CVE-2025-66959
EPSS 0% CVSS 7.5
HIGH POC This Week

An issue in ollama v.0.12.10 allows a remote attacker to cause a denial of service via the GGUF decoder [CVSS 7.5 HIGH]

Denial Of Service AI / ML Ollama +2
NVD GitHub
CVE-2025-56005
EPSS 1% CVSS 9.8
CRITICAL POC PATCH Act Now

PLY (Python Lex-Yacc) library 3.11 has an unsafe feature enabling remote code execution through pickle deserialization of cached parser tables, with EPSS 0.91%.

Python Github RCE +5
NVD GitHub
CVE-2025-33233
EPSS 0% CVSS 7.8
HIGH This Week

NVIDIA Merlin Transformers4Rec for all platforms contains a vulnerability where an attacker could cause code injection. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering. [CVSS 7.8 HIGH]

Privilege Escalation Code Injection Information Disclosure +1
NVD
CVE-2026-22219
EPSS 0% CVSS 7.7
HIGH POC PATCH This Week

Chainlit versions before 2.9.4 with SQLAlchemy backend contain a server-side request forgery vulnerability in the project element update endpoint that allows authenticated attackers to make arbitrary HTTP requests from the server. Public exploit code exists for this vulnerability, enabling attackers to reach internal network services, cloud metadata endpoints, and store responses through the configured storage system. The vulnerability affects AI/ML applications using vulnerable Chainlit deployments and currently has no available patch.

SSRF AI / ML Chainlit
NVD GitHub
CVE-2026-22218
EPSS 0% CVSS 6.5
MEDIUM POC This Month

Authenticated users in Chainlit versions before 2.9.4 can read arbitrary files accessible to the Chainlit service through a path traversal flaw in the element update endpoint. By crafting a malicious Element with a custom path, an attacker retrieves file contents via the /project/file API, enabling disclosure of sensitive data. Public exploit code exists for this vulnerability and no patch is currently available.

Path Traversal AI / ML Chainlit
NVD GitHub
CVE-2026-23875
EPSS 0% CVSS 5.4
MEDIUM POC PATCH This Month

Improper permission validation in CrawlChat versions prior to 0.0.8 allows unauthenticated Discord guild members to inject malicious content into the bot's knowledge base through the jigsaw emoji feature, enabling attackers to manipulate chatbot responses across all integrations and redirect users to malicious sites. The vulnerability affects the AI/ML platform's ability to maintain knowledge base integrity, as normal users can bypass intended admin-only controls. Public exploit code exists for this issue, though a patch is available.

Authentication Bypass AI / ML Crawlchat
NVD GitHub
CVE-2026-23842
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

ChatterBot versions through 1.2.10 suffer from denial-of-service vulnerabilities due to improper connection pool management that allows attackers to exhaust database connections through concurrent requests to the get_response() method, causing persistent service unavailability. Public exploit code exists for this vulnerability, which affects all deployments of the affected ChatterBot versions and requires manual service restart to recover. ChatterBot 1.2.11 addresses this issue.

Denial Of Service AI / ML Chatterbot
NVD GitHub
CVE-2026-23733
EPSS 0% CVSS 6.4
MEDIUM This Month

Stored XSS in LobeChat's Mermaid artifact renderer prior to version 2.0.0-next.180 enables attackers to execute arbitrary JavaScript, which can be escalated to remote code execution through the exposed electronAPI IPC bridge to run system commands. This affects users of the open source chat platform running vulnerable versions, requiring local interaction and high privileges to exploit but resulting in full system compromise. No patch is currently available.

RCE XSS AI / ML
NVD GitHub
CVE-2026-0863
EPSS 0% CVSS 8.5
HIGH POC PATCH This Week

Authenticated users can exploit string formatting and exception handling in n8n's Python task executor to escape sandbox restrictions and execute arbitrary code on the underlying operating system, with full instance takeover possible in Internal execution mode. Public exploit code exists for this vulnerability, which affects n8n deployments running under Internal execution mode where the Python executor has direct OS access. External execution mode deployments using Docker sidecars have reduced impact as code execution is confined to the container rather than the main node.

Python Docker AI / ML +1
NVD GitHub
CVE-2026-23744
EPSS 17% CVSS 9.8
CRITICAL PATCH Act Now

MCPJam Inspector versions 1.4.2 and earlier allow unauthenticated remote code execution through missing authentication in the MCP server debugging platform, with EPSS 17.2% indicating active scanning.

RCE Authentication Bypass AI / ML +1
NVD GitHub VulDB
CVE-2026-23528
EPSS 0% CVSS 6.1
MEDIUM PATCH This Month

Dask distributed is a distributed task scheduler for Dask. [CVSS 6.1 MEDIUM]

Linux Python AI / ML +1
NVD GitHub
CVE-2026-23523
EPSS 0% CVSS 9.6
CRITICAL POC PATCH Act Now

Dive, an MCP Host Desktop Application for LLM integration, allows code injection prior to version 0.13.0 through malicious tool responses, enabling attackers to execute arbitrary code on the user's machine.

RCE Code Injection AI / ML +1
NVD GitHub
CVE-2026-0616
EPSS 0% CVSS 7.5
HIGH This Week

TheLibrarian's web_fetch tool can expose the Adminer interface, enabling unauthenticated remote attackers to obtain credentials for the internal backend system. This high-severity vulnerability affects AI/ML deployments and TheLibrarian installations, with no patch currently available. An attacker with network access could leverage the exposed interface to gain unauthorized administrative access to the backend infrastructure.

Information Disclosure AI / ML The Librarian
NVD
CVE-2026-0615
EPSS 0% CVSS 7.3
HIGH This Week

The Librarian's web_fetch tool can access the supervisord status page, exposing information about running backend processes to unauthenticated remote attackers. This information disclosure vulnerability (CVSS 7.3) affects AI/ML deployments and could enable attackers to map internal service architecture and identify targets for further exploitation. No patch is currently available for this vulnerability.

Information Disclosure AI / ML The Librarian
NVD
CVE-2026-0613
EPSS 0% CVSS 7.5
HIGH This Week

The Librarian's web_fetch tool can be exploited via SSRF to perform unauthorized GET requests against internal IP addresses and cloud services within the Hertzner environment, allowing attackers to conduct port scanning and reconnaissance of the infrastructure. This unauthenticated network-based attack requires no user interaction and could expose sensitive internal services and their configurations. While the vendor has released patches, exploitation remains possible on unpatched instances.

SSRF AI / ML The Librarian
NVD
CVE-2026-0612
EPSS 0% CVSS 7.5
HIGH This Week

The Librarian's web_fetch tool permits attackers to retrieve arbitrary external content and proxy requests through the application's infrastructure without authentication, resulting in information disclosure. This network-accessible vulnerability affects all versions of The Librarian AI/ML product and has high severity due to its ease of exploitation and potential for infrastructure abuse. A vendor patch is currently unavailable.

Information Disclosure AI / ML The Librarian
NVD
CVE-2025-14384
EPSS 0% CVSS 4.3
MEDIUM This Month

The All in One SEO - Powerful SEO Plugin to Boost SEO Rankings & Increase Traffic plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the `/aioseo/v1/ai/credits` REST route in all versions up to, and including, 4.9.2. [CVSS 4.3 MEDIUM]

WordPress AI / ML PHP
NVD
CVE-2025-65368
EPSS 0% CVSS 6.1
MEDIUM POC This Month

SparkyFitness v0.15.8.2 is vulnerable to Cross Site Scripting (XSS) via user input and LLM output. [CVSS 6.1 MEDIUM]

XSS AI / ML Sparkyfitness
NVD GitHub
Prev Page 4 of 6 Next

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy