aisecwatch.com
DashboardVulnerabilitiesNewsResearchArchiveStatsDatasetFor devs
Subscribe
aisecwatch.com

Real-time AI security monitoring. Tracking AI-related vulnerabilities, safety and security incidents, privacy risks, research developments, and policy changes.

Navigation

VulnerabilitiesNewsResearchDigest ArchiveNewsletter ArchiveSubscribeData SourcesStatisticsDatasetAPIIntegrationsWidgetRSS Feed

Maintained by

Truong (Jack) Luu

Information Systems Researcher

AI Sec Watch

The security intelligence platform for AI teams

AI security threats move fast and get buried under hype and noise. Built by an Information Systems Security researcher to help security teams and developers stay ahead of vulnerabilities, privacy incidents, safety research, and policy developments.

Independent research. No sponsors, no paywalls, no conflicts of interest.

[TOTAL_TRACKED]
3,710
[LAST_24H]
1
[LAST_7D]
1
Daily BriefingMonday, May 18, 2026

No new AI/LLM security issues were identified today.

Latest Intel

page 141/371
VIEW ALL
01

GCP-2026-012

security
Mar 11, 2026

Google Cloud Vertex AI (a machine learning platform) had a vulnerability in versions 1.21.0 through 1.132.x where an attacker could create Cloud Storage buckets (cloud storage containers) with predictable names to trick the system into using them, allowing unauthorized access, model theft, and code execution across different customers' environments. The vulnerability has been fixed in version 1.133.0 and later, and no action is required from users.

Fix: Mitigations have already been applied to version 1.133.0 and later. Update to Vertex AI Experiments version 1.133.0 or later.

Google Cloud Security Bulletins
02

GCP-2026-011

security
Mar 11, 2026

A stored XSS vulnerability (cross-site scripting, where an attacker injects malicious code that gets saved and runs when others view it) was found in Google's Vertex AI Python SDK visualization tool. An unauthenticated attacker could inject harmful JavaScript code into model evaluation results or dataset files, which would then execute in a victim's Jupyter or Colab environment (cloud-based coding notebooks).

Fix: Update the google-cloud-aiplatform Python SDK to version 1.131.0 or later (released on 2025-12-16) to receive the fix.

Google Cloud Security Bulletins
03

CVE-2026-31975: Cloud CLI (aka Claude Code UI) is a desktop and mobile UI for Claude Code, Cursor CLI, Codex, and Gemini-CLI. Prior to 1

security
Mar 11, 2026

Cloud CLI (a user interface for Claude Code and similar tools) had a critical vulnerability in versions before 1.25.0 where user inputs called projectPath, initialCommand, and sessionId were directly used to build system commands without filtering, allowing attackers to inject arbitrary OS commands (OS command injection, where an attacker tricks the system into running unauthorized commands) through WebSocket connections. This vulnerability has been patched in version 1.25.0.

Fix: Update Cloud CLI to version 1.25.0 or later, which fixes the OS command injection vulnerability.

NVD/CVE Database
04

CVE-2026-31862: Cloud CLI (aka Claude Code UI) is a desktop and mobile UI for Claude Code, Cursor CLI, Codex, and Gemini-CLI. Prior to 1

security
Mar 11, 2026

Cloud CLI (a user interface for AI coding tools like Claude Code and Gemini-CLI) had a vulnerability before version 1.24.0 where attackers who had login access could run unauthorized commands on a computer by manipulating text inputs in Git-related features. This happened because the software used string interpolation (directly inserting user text into commands) without properly checking if the input was safe, which is a type of OS command injection (CWE-78, where an attacker tricks the system into executing arbitrary commands).

Fix: This vulnerability is fixed in version 1.24.0. Users should update Cloud CLI to 1.24.0 or later.

NVD/CVE Database
05

CVE-2026-31861: Cloud CLI (aka Claude Code UI) is a desktop and mobile UI for Claude Code, Cursor CLI, Codex, and Gemini-CLI. Prior to 1

security
Mar 11, 2026

Cloud CLI (a user interface for accessing Claude Code and similar tools) has a vulnerability in versions before 1.24.0 where user input in the git configuration endpoint is not properly sanitized before being executed as shell commands. This means an authenticated attacker (someone with login access) could run arbitrary OS commands (commands that do whatever they want on the operating system) by exploiting how backticks, command substitution (${}), and backslashes are interpreted within the double-quoted strings.

Fix: This vulnerability is fixed in version 1.24.0. Users should update Cloud CLI to version 1.24.0 or later.

NVD/CVE Database
06

CVE-2026-31854: Cursor is a code editor built for programming with AI. Prior to 2.0 ,if a visited website contains maliciously crafted i

security
Mar 11, 2026

Cursor is a code editor designed for programming with AI assistance. Before version 2.0, the software was vulnerable to prompt injection attacks (tricking the AI by hiding malicious instructions in website content), which could bypass the command whitelist (a list of allowed commands) and cause the AI to execute commands without the user's permission. This is a serious security flaw rated as HIGH severity.

Fix: This vulnerability is fixed in version 2.0.

NVD/CVE Database
07

OpenAI’s Sora video generator is reportedly coming to ChatGPT

industry
Mar 11, 2026

OpenAI is planning to integrate Sora, its video generation tool, directly into ChatGPT as a built-in feature, similar to how image generation was added previously. While this could increase ChatGPT's popularity, it may also increase the creation of deepfakes (synthetic videos that convincingly mimic real people or events) from the platform.

The Verge (AI)
08

Researchers Trick Perplexity's Comet AI Browser Into Phishing Scam in Under Four Minutes

securitysafety
Mar 11, 2026

Researchers demonstrated that agentic web browsers (AI systems that automatically perform actions across websites) can be tricked into phishing scams by using a GAN (generative adversarial network, a machine learning technique that generates increasingly refined fake content) to intercept and manipulate the AI's internal reasoning communications. Once a fraudster optimizes a fake page to bypass a specific AI browser's safeguards, that same malicious page works on all users of that browser, shifting the attack target from humans to the AI system itself.

Fix: The issues collectively codenamed PerplexedBrowser have been addressed by Perplexity (the AI company). The text does not provide specific technical details about how the fixes work or which versions contain the patches.

The Hacker News
09

CVE-2026-30741: A remote code execution (RCE) vulnerability in OpenClaw Agent Platform v2026.2.6 allows attackers to execute arbitrary c

security
Mar 11, 2026

CVE-2026-30741 is a remote code execution (RCE, where an attacker can run commands on a system they don't own) vulnerability in OpenClaw Agent Platform v2026.2.6 that can be triggered through a request-side prompt injection attack (tricking the AI by hiding malicious instructions in its input). The vulnerability allows attackers to execute arbitrary code, though a CVSS severity score (a 0-10 rating of how severe a vulnerability is) has not yet been assigned by NIST.

NVD/CVE Database
10

Meta’s Moltbook deal points to a future built around AI agents

industry
Mar 11, 2026

Meta acquired Moltbook, a social network for AI agents (autonomous software systems that act independently), primarily to hire its talented team rather than for the platform itself. Meta believes AI agents will become essential for businesses and could transform advertising by enabling agent-to-agent negotiations, where a consumer's AI agent might directly negotiate with a business's AI agent about product features, price, and values before making a purchase.

TechCrunch
Prev1...139140141142143...371Next