aisecwatch.com
DashboardVulnerabilitiesNewsResearchArchiveStatsDatasetFor devs
Subscribe
aisecwatch.com

Real-time AI security monitoring. Tracking AI-related vulnerabilities, safety and security incidents, privacy risks, research developments, and policy changes.

Navigation

VulnerabilitiesNewsResearchDigest ArchiveNewsletter ArchiveSubscribeData SourcesStatisticsDatasetAPIIntegrationsWidgetRSS Feed

Maintained by

Truong (Jack) Luu

Information Systems Researcher

AI Sec Watch

The security intelligence platform for AI teams

AI security threats move fast and get buried under hype and noise. Built by an Information Systems Security researcher to help security teams and developers stay ahead of vulnerabilities, privacy incidents, safety research, and policy developments.

Independent research. No sponsors, no paywalls, no conflicts of interest.

[TOTAL_TRACKED]
3,710
[LAST_24H]
1
[LAST_7D]
1
Daily BriefingMonday, May 18, 2026

No new AI/LLM security issues were identified today.

Latest Intel

page 126/371
VIEW ALL
01

GHSA-8qvf-mr4w-9x2c: Mesop has a Path Traversal utilizing `FileStateSessionBackend` leads to Application Denial of Service and File Write/Deletion

security
Mar 18, 2026

Mesop has a path traversal vulnerability (a technique where an attacker uses sequences like `../` to escape intended directory boundaries) in its file-based session backend that allows attackers to read, write, or delete arbitrary files on the server by crafting malicious `state_token` values in messages sent to the `/ui` endpoint. This can crash the application or give attackers unauthorized access to system files.

GitHub Advisory Database
02

ChatGPT did not cure a dog’s cancer

safety
Mar 18, 2026

A story claimed that ChatGPT helped cure an Australian entrepreneur's dog of cancer, generating widespread attention as evidence that AI could revolutionize medicine. However, the article suggests this narrative is more complicated than the promoted version, implying the reality behind the claim differs from what was publicly reported.

The Verge (AI)
03

GHSA-22cc-p3c6-wpvm: h3 has a Server-Sent Events Injection via Unsanitized Newlines in Event Stream Fields

security
Mar 18, 2026

The h3 library has a vulnerability in its Server-Sent Events (SSE, a protocol for pushing real-time messages from a server to connected clients) implementation where newline characters in message fields are not removed before being sent. An attacker who controls any message field (id, event, data, or comment) can inject newline characters to break the SSE format and trick clients into receiving fake events, potentially forcing aggressive reconnections or manipulating which past events are replayed.

GitHub Advisory Database
04

'Claudy Day’ Trio of Flaws Exposes Claude Users to Data Theft

security
Mar 18, 2026

Researchers discovered three connected flaws in Claude (an AI assistant) that can work together to steal user data, starting with a prompt injection attack (tricking the AI by hiding malicious instructions in its input) combined with a Google search vulnerability. This attack chain could potentially compromise enterprise networks that rely on Claude.

Dark Reading
05

Shadow AI Risk: How SaaS Apps Are Quietly Enabling Massive Breaches

securitysafety
Mar 18, 2026

Shadow AI refers to AI systems hidden within SaaS applications (software services accessed online) that operate without proper oversight, creating security risks that can lead to major data breaches. The article emphasizes that organizations lack visibility into these autonomous AI systems and calls for better monitoring and control mechanisms to manage agentic AI (AI that can independently take actions to achieve goals).

SecurityWeek
06

A Dual-Purpose Framework for Backdoor Defense and Backdoor Amplification in Diffusion Models

securityresearch
Mar 18, 2026

Diffusion models (AI systems that generate images and other content by gradually removing noise from random data) are vulnerable to backdoor attacks, where hidden triggers cause the model to produce harmful outputs. Researchers created PureDiffusion, a framework that can both defend against these attacks by detecting and inverting the hidden triggers, and amplify attacks by making existing backdoors more effective.

IEEE Xplore (Security & AI Journals)
07

N Truths and a Lie: Consistency-Based Backdoor Defense for Vertical Federated Learning

securityresearch
Mar 18, 2026

This paper addresses backdoor attacks (where attackers secretly poison AI models to make them behave maliciously) in vertical federated learning (VFL, a setup where different organizations train an AI together on their own private data). The researchers propose a defense using a latent masked autoencoder (LMAE, a type of neural network that detects patterns and missing information) to identify when one participant is submitting suspicious, inconsistent data compared to honest participants, allowing the system to reject malicious contributions.

Fix: The paper proposes a novel defense mechanism using a latent masked autoencoder (LMAE) to assess the semantic consistency of embeddings (learned data representations) from different participants. The authors developed an algorithm based on the LMAE that identifies attackers and enables backdoor-resistant predictions. The defense was tested on multiple datasets and backdoor attack types and demonstrated effectiveness at identifying attackers while maintaining high prediction accuracy.

IEEE Xplore (Security & AI Journals)
08

GHSA-3xm7-qw7j-qc8v: SSRF in @aborruso/ckan-mcp-server via base_url allows access to internal networks

security
Mar 18, 2026

The @aborruso/ckan-mcp-server tool allows attackers to make HTTP requests to any address by controlling the `base_url` parameter, which has no validation or filtering. An attacker can use prompt injection (tricking the AI by hiding instructions in its input) to make the tool scan internal networks or steal cloud credentials, but exploitation requires the victim's AI assistant to have this server connected.

Fix: The source explicitly recommends: (1) Validate `base_url` against a configurable allowlist of permitted CKAN portals, (2) Block private IP ranges (RFC 1918, link-local addresses like 169.254.x.x), (3) Block cloud metadata endpoints (169.254.169.254), (4) Sanitize SQL input for datastore queries, and (5) Implement a SPARQL endpoint allowlist.

GitHub Advisory Database
09

GHSA-rf6x-r45m-xv3w: Langflow is Missing Ownership Verification in API Key Deletion (IDOR)

security
Mar 18, 2026

Langflow has a security flaw called IDOR (insecure direct object reference, where an attacker can access or modify resources belonging to other users) in its API key deletion feature. An authenticated attacker can delete other users' API keys by guessing their IDs, because the deletion endpoint doesn't verify that the API key belongs to the person making the request. This could allow attackers to disable other users' integrations or take over their accounts.

Fix: Modify the delete_api_key endpoint and function by: (1) passing current_user to the delete function; (2) adding a verification check in delete_api_key() that confirms api_key.user_id == current_user.id before deletion; (3) returning a 403 Forbidden error if the user doesn't own the key. Example code provided: 'if api_key.user_id != user_id: raise HTTPException(status_code=403, detail="Unauthorized")'

GitHub Advisory Database
10

The Download: The Pentagon’s new AI plans, and next-gen nuclear reactors

securitypolicy
Mar 18, 2026

The Pentagon is planning to create secure environments where AI companies can train their models on classified military data, which would embed sensitive intelligence like surveillance reports into the AI systems themselves and bring these companies closer to classified information than before. This represents a major shift from current use of AI models like Claude in classified settings, but introduces unique security risks by allowing models to learn from rather than just access classified data.

MIT Technology Review
Prev1...124125126127128...371Next