aisecwatch.com
DashboardVulnerabilitiesNewsResearchArchiveStatsDatasetFor devs
Subscribe
aisecwatch.com

Real-time AI security monitoring. Tracking AI-related vulnerabilities, safety and security incidents, privacy risks, research developments, and policy changes.

Navigation

VulnerabilitiesNewsResearchDigest ArchiveNewsletter ArchiveSubscribeData SourcesStatisticsDatasetAPIIntegrationsWidgetRSS Feed

Maintained by

Truong (Jack) Luu

Information Systems Researcher

AI Sec Watch

The security intelligence platform for AI teams

AI security threats move fast and get buried under hype and noise. Built by an Information Systems Security researcher to help security teams and developers stay ahead of vulnerabilities, privacy incidents, safety research, and policy developments.

Independent research. No sponsors, no paywalls, no conflicts of interest.

[TOTAL_TRACKED]
3,710
[LAST_24H]
1
[LAST_7D]
1
Daily BriefingFriday, May 8, 2026
>

Critical RCE Vulnerabilities in LiteLLM Proxy Server: LiteLLM, a proxy server that forwards requests to AI model APIs, disclosed three critical and high-severity flaws in versions 1.74.2 through 1.83.6. Two test endpoints allowed attackers with valid API keys to execute arbitrary code (running any commands an attacker wants) on the server by submitting malicious configurations or prompt templates without sandboxing (CVE-2026-42271, CVE-2026-42203, both critical), while a SQL injection flaw (inserting malicious code into database queries) let unauthenticated attackers read or modify stored API credentials (CVE-2026-42208, high).

>

ClaudeBleed Exploit Allows Extension Hijacking in Chrome: Anthropic's Claude browser extension contains a vulnerability that allows malicious Chrome extensions to hijack it and perform unauthorized actions like exfiltrating files, sending emails, or stealing code from private repositories. The flaw stems from the extension trusting any script from claude.ai without verifying the actual caller, and while Anthropic released a partial fix in version 1.0.70 on May 6, researchers report it remains exploitable when the extension runs in privileged mode.

Latest Intel

page 59/371
VIEW ALL
01

Critical nginx UI tool vulnerability opens web servers to full compromise

security
Apr 15, 2026

A critical vulnerability in nginx UI, a dashboard tool for managing nginx web servers, allows attackers to bypass security by accessing an unprotected endpoint called /mcp_message. This endpoint was added to support MCP (Model Context Protocol, a system that lets web servers communicate with AI models), but it lacks authentication, letting anyone on the network inject malicious configurations and completely take over the server.

>

AI Systems Show Triple the High-Risk Vulnerabilities of Legacy Software: Penetration testing data reveals that AI and LLM systems have 32% of findings rated high-risk compared to just 13% for traditional software, with only 38% of high-risk AI issues getting resolved. Security experts attribute this gap to rapid deployment without mature controls, novel attack surfaces like prompt injection (tricking AI by hiding instructions in input), and fragmented responsibility for remediation across teams.

>

Model Context Protocol Emerging as Critical Security Blind Spot: Model Context Protocol (MCP, a plugin system connecting AI agents to external tools) has become a major vulnerability vector as organizations fail to scan for or monitor MCP-related risks. Recent supply chain attacks, such as the postmark-mcp npm package that exfiltrated emails from 300 organizations, demonstrate how attackers exploit widely-trusted MCP packages and hardcoded credentials in AI configurations to enable credential theft and supply chain compromises at scale.

Fix: Update to version 2.3.4, released March 15. For systems that cannot patch immediately, disable MCP or restrict access by using IP whitelisting to allow only trusted hosts, and review access logs for suspicious configuration changes.

CSO Online
02

Google launches a Gemini AI app on Mac

industry
Apr 15, 2026

Google is releasing a new Gemini app for Mac that lets you quickly access the AI assistant using a keyboard shortcut (Option + Space) to open a floating chat window without leaving your current app. The app can read information from your screen to help answer questions, but requires you to grant permission to access your system's information first.

The Verge (AI)
03

Anthropic products are operational after brief outage, status page says

industry
Apr 15, 2026

Anthropic experienced a brief outage on Wednesday affecting its Claude chatbot, API (application programming interface, the connection between software services), and Claude Code assistant, with elevated error rates beginning around 10:53 a.m. ET. By 1:50 p.m. ET, all systems were restored and operational, with login success rates stabilizing by 12:30 p.m. ET.

CNBC Technology
04

Starbucks launches beta app in ChatGPT to fuel new drink discovery

industry
Apr 15, 2026

Starbucks has launched a beta app within ChatGPT (an AI chatbot) that helps customers discover new drinks by describing how they feel rather than browsing a menu. Customers can customize orders and select a location within ChatGPT, but must complete their purchase through the Starbucks app or website to maintain engagement with the company's loyalty program. This move is part of Starbucks' broader strategy to attract customers back to its cafes and appeal to younger consumers who prefer unique beverages.

CNBC Technology
05

Gemini 3.1 Flash TTS

industry
Apr 15, 2026

Google released Gemini 3.1 Flash TTS, a new text-to-speech model that generates audio from text using prompts sent through the standard Gemini API. Unlike typical AI models, this one accepts detailed creative instructions (called prompts) to control how the audio sounds, including vocal style, pace, accent, and emotional tone, allowing users to create speech with specific characteristics like a particular regional accent or energetic delivery.

Simon Willison's Weblog
06

Gemini 3.1 Flash TTS

industry
Apr 15, 2026

This item is a brief announcement about Gemini 3.1 Flash TTS (a text-to-speech feature for Google's Gemini AI model) posted on April 15, 2026. The content provided is primarily metadata and sponsorship information rather than substantive technical details about the feature or any security issue.

Simon Willison's Weblog
07

CVE-2026-30617: LangChain-ChatChat 0.3.1 contains a remote code execution vulnerability in its MCP STDIO server configuration and execut

security
Apr 15, 2026

LangChain-ChatChat version 0.3.1 has a remote code execution vulnerability (RCE, where an attacker can run commands on a system they don't own) in how it handles MCP STDIO servers (a communication protocol for server connections). An attacker can access the exposed management interface, set up a malicious MCP server with commands of their choice, and then trigger those commands to run when the service processes agent requests.

NVD/CVE Database
08

CVE-2026-30615: A prompt injection vulnerability in Windsurf 1.9544.26 allows remote attackers to execute arbitrary commands on a victim

security
Apr 15, 2026

Windsurf version 1.9544.26 has a prompt injection vulnerability (a technique where attackers hide malicious instructions in input to trick an AI system) that allows remote attackers to execute arbitrary commands on a victim's computer. When Windsurf processes attacker-controlled HTML content, it can be tricked into automatically registering a malicious MCP STDIO server (a communication interface for running code), giving attackers the ability to run commands without the user's knowledge.

NVD/CVE Database
09

Gemini 3.1 Flash TTS: the next generation of expressive AI speech

industry
Apr 15, 2026

Google has released Gemini 3.1 Flash TTS, a new text-to-speech model (software that converts written text into spoken audio) that produces more natural-sounding speech with better control over how the AI speaks. Developers can now use audio tags (special commands embedded in text) to adjust vocal style, pace, and delivery across over 70 languages, and all generated audio is watermarked with SynthID (a hidden marker that identifies AI-generated content) to help prevent misinformation.

DeepMind Safety Research
10

ChatGPT’s latest stylistic quirk is sinister, infuriating – and absolutely everywhere | Stuart Heritage

safety
Apr 15, 2026

A writer notices that ChatGPT and other AI systems are producing content using the rhetorical pattern "it's not X, it's Y" so frequently that this phrasing has become ubiquitous online, appearing in social media posts, fitness classes, and TV shows. The author compares this experience to obsessively noticing a specific detail until it dominates their perception, making the repetitive AI-influenced writing style impossible to ignore.

The Guardian Technology
Prev1...5758596061...371Next