aisecwatch.com
DashboardVulnerabilitiesNewsResearchArchiveStatsDatasetFor devs
Subscribe
aisecwatch.com

Real-time AI security monitoring. Tracking AI-related vulnerabilities, safety and security incidents, privacy risks, research developments, and policy changes.

Navigation

VulnerabilitiesNewsResearchDigest ArchiveNewsletter ArchiveSubscribeData SourcesStatisticsDatasetAPIIntegrationsWidgetRSS Feed

Maintained by

Truong (Jack) Luu

Information Systems Researcher

AI Sec Watch

The security intelligence platform for AI teams

AI security threats move fast and get buried under hype and noise. Built by an Information Systems Security researcher to help security teams and developers stay ahead of vulnerabilities, privacy incidents, safety research, and policy developments.

Independent research. No sponsors, no paywalls, no conflicts of interest.

[TOTAL_TRACKED]
3,710
[LAST_24H]
1
[LAST_7D]
1
Daily BriefingSunday, May 17, 2026

No new AI/LLM security issues were identified today.

Latest Intel

page 221/371
VIEW ALL
01

CVE-2026-24123: BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to vers

security
Jan 26, 2026

BentoML, a Python library for serving AI models, had a vulnerability (before version 1.4.34) that allowed path traversal attacks (exploiting file path inputs to access files outside intended directories) through its configuration file. An attacker could trick a user into building a malicious configuration that would steal sensitive files like SSH keys or passwords and hide them in the compiled application, potentially exposing them when shared or deployed.

Fix: Update BentoML to version 1.4.34 or later, which contains a patch for this issue.

NVD/CVE Database
02

CVE-2025-13374: The Kalrav AI Agent plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in

security
Jan 24, 2026

The Kalrav AI Agent plugin for WordPress (versions up to 2.3.3) has a vulnerability in its file upload feature that fails to check what type of file is being uploaded. This allows attackers without user accounts to upload malicious files to the server, potentially leading to RCE (remote code execution, where an attacker can run commands on a system they don't own).

NVD/CVE Database
03

CVE-2026-24399: ChatterMate is a no-code AI chatbot agent framework. In versions 1.0.8 and below, the chatbot accepts and executes malic

security
Jan 23, 2026

ChatterMate, a no-code AI chatbot framework (software that lets people build chatbots without writing code), has a security flaw in versions 1.0.8 and earlier where it accepts and runs malicious HTML/JavaScript code from user chat input. An attacker could send specially crafted code (like an iframe with a javascript: link) that executes in the user's browser and steals sensitive data such as localStorage tokens and cookies, which are used to keep users logged in.

Fix: Update to version 1.0.9, where this issue has been fixed. The patch is available at https://github.com/chattermate/chattermate.chat/releases/tag/v1.0.9.

NVD/CVE Database
04

Search Engines, AI, And The Long Fight Over Fair Use

policyresearch
Jan 23, 2026

This article argues that training AI models on copyrighted works should be protected as fair use (the legal right to use copyrighted material without permission for certain purposes like research or analysis), just as courts have previously allowed for search engines and other information technologies. The article contends that AI training is transformative because it extracts patterns from works rather than replacing them, and that expanding copyright restrictions on AI training could harm legitimate research practices in science and medicine.

EFF Deeplinks Blog
05

CVE-2026-0772: Langflow Disk Cache Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows rem

security
Jan 23, 2026

Langflow contains a remote code execution (RCE, where an attacker can run commands on a system they don't own) vulnerability in its disk cache service that allows authenticated attackers to execute arbitrary code by sending maliciously crafted data that the system deserializes (converts from stored format back into usable objects) without proper validation. The flaw exploits insufficient checking of user-supplied input, letting attackers run code with the permissions of the service account.

NVD/CVE Database
06

CVE-2026-0771: Langflow PythonFunction Code Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers t

security
Jan 23, 2026

Langflow, a workflow automation tool, has a vulnerability where attackers can inject malicious Python code into Python function components and execute it on the server (RCE, or remote code execution). The severity and how it can be exploited depend on how Langflow is configured.

NVD/CVE Database
07

CVE-2026-0770: Langflow exec_globals Inclusion of Functionality from Untrusted Control Sphere Remote Code Execution Vulnerability. This

security
Jan 23, 2026

Langflow contains a remote code execution vulnerability (RCE, where an attacker can run commands on a system they don't own) in how it handles the exec_globals parameter at the validate endpoint, allowing unauthenticated attackers to execute arbitrary code with root-level privileges. The flaw stems from including functionality from an untrusted source without proper validation.

NVD/CVE Database
08

CVE-2026-0769: Langflow eval_custom_component_code Eval Injection Remote Code Execution Vulnerability. This vulnerability allows remote

security
Jan 23, 2026

Langflow contains a vulnerability in its eval_custom_component_code function that allows attackers to execute arbitrary code (RCE, or remote code execution) without needing to log in. The flaw occurs because the function doesn't properly validate user input before executing it as Python code, letting attackers run any commands they want on the affected system.

NVD/CVE Database
09

CVE-2026-0768: Langflow code Code Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute

security
Jan 23, 2026

Langflow has a critical vulnerability where attackers can execute arbitrary code (commands) on the server without needing to log in, by sending malicious input to the validate endpoint. The flaw occurs because the code parameter is not properly checked before being run as Python code, allowing an attacker to run commands with root-level permissions (the highest system access level).

NVD/CVE Database
10

CVE-2025-15063: Ollama MCP Server execAsync Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote atta

security
Jan 23, 2026

Ollama MCP Server contains a command injection vulnerability (a flaw where an attacker can insert malicious commands into user input that gets executed) in its execAsync method that allows unauthenticated attackers to run arbitrary code on the affected system. The vulnerability exists because the server doesn't properly validate user input before passing it to system commands, letting attackers execute code with the same privileges as the service running the server.

NVD/CVE Database
Prev1...219220221222223...371Next