aisecwatch.com
DashboardVulnerabilitiesNewsResearchArchiveStatsDatasetFor devs
Subscribe
aisecwatch.com

Real-time AI security monitoring. Tracking AI-related vulnerabilities, safety and security incidents, privacy risks, research developments, and policy changes.

Navigation

VulnerabilitiesNewsResearchDigest ArchiveNewsletter ArchiveSubscribeData SourcesStatisticsDatasetAPIIntegrationsWidgetRSS Feed

Maintained by

Truong (Jack) Luu

Information Systems Researcher

AI Sec Watch

The security intelligence platform for AI teams

AI security threats move fast and get buried under hype and noise. Built by an Information Systems Security researcher to help security teams and developers stay ahead of vulnerabilities, privacy incidents, safety research, and policy developments.

Independent research. No sponsors, no paywalls, no conflicts of interest.

[TOTAL_TRACKED]
3,710
[LAST_24H]
1
[LAST_7D]
69
Daily BriefingFriday, May 8, 2026
>

Critical RCE Vulnerabilities in LiteLLM Proxy Server: LiteLLM, a proxy server that forwards requests to AI model APIs, disclosed three critical and high-severity flaws in versions 1.74.2 through 1.83.6. Two test endpoints allowed attackers with valid API keys to execute arbitrary code (running any commands an attacker wants) on the server by submitting malicious configurations or prompt templates without sandboxing (CVE-2026-42271, CVE-2026-42203, both critical), while a SQL injection flaw (inserting malicious code into database queries) let unauthenticated attackers read or modify stored API credentials (CVE-2026-42208, high).

>

ClaudeBleed Exploit Allows Extension Hijacking in Chrome: Anthropic's Claude browser extension contains a vulnerability that allows malicious Chrome extensions to hijack it and perform unauthorized actions like exfiltrating files, sending emails, or stealing code from private repositories. The flaw stems from the extension trusting any script from claude.ai without verifying the actual caller, and while Anthropic released a partial fix in version 1.0.70 on May 6, researchers report it remains exploitable when the extension runs in privileged mode.

Latest Intel

page 7/371
VIEW ALL
01

GHSA-pjv4-3c63-699f: opentelemetry-collector-contrib's azureauthextension Authenticate method does not validate bearer tokens, allowing auth bypass via replay

security
May 6, 2026
Critical This Week5 issues
critical

CVE-2026-42271: LiteLLM is a proxy server (AI Gateway) to call LLM APIs in OpenAI (or native) format. From version 1.74.2 to before vers

CVE-2026-42271NVD/CVE DatabaseMay 8, 2026
May 8, 2026
>

AI Systems Show Triple the High-Risk Vulnerabilities of Legacy Software: Penetration testing data reveals that AI and LLM systems have 32% of findings rated high-risk compared to just 13% for traditional software, with only 38% of high-risk AI issues getting resolved. Security experts attribute this gap to rapid deployment without mature controls, novel attack surfaces like prompt injection (tricking AI by hiding instructions in input), and fragmented responsibility for remediation across teams.

>

Model Context Protocol Emerging as Critical Security Blind Spot: Model Context Protocol (MCP, a plugin system connecting AI agents to external tools) has become a major vulnerability vector as organizations fail to scan for or monitor MCP-related risks. Recent supply chain attacks, such as the postmark-mcp npm package that exfiltrated emails from 300 organizations, demonstrate how attackers exploit widely-trusted MCP packages and hardcoded credentials in AI configurations to enable credential theft and supply chain compromises at scale.

The Azure authentication extension in OpenTelemetry Collector has a critical flaw where it compares bearer tokens (credentials that prove you are who you claim to be) as plain text strings instead of validating them as JWTs (JSON Web Tokens, a standard secure token format). This allows attackers who obtain a valid Azure token to reuse it indefinitely by setting the correct Host header, bypassing authentication entirely.

GitHub Advisory Database
02

Anthropic CEO says 80-fold growth in first quarter explains 'difficulties with compute'

industry
May 6, 2026

Anthropic's CEO reported that the company experienced 80-fold growth in revenue and usage during the first quarter, far exceeding their planned 10-fold growth, which has created severe strain on their computing infrastructure. To address the shortage, Anthropic signed a deal with SpaceX to access over 300 megawatts of computing capacity from the Colossus 1 data center in Memphis, Tennessee, and is working to increase capacity through other agreements including a multibillion-dollar deal with Amazon.

Fix: Anthropic is working as quickly as possible to provide more computing capacity and will pass that compute on to users as soon as possible. The company has inked several compute deals in recent weeks, including a deal with SpaceX for over 300 megawatts of capacity at the Colossus 1 data center and a multibillion-dollar agreement with Amazon.

CNBC Technology
03

GHSA-gmvf-9v4p-v8jc: fast-jwt: JWT auth bypass due to empty HMAC secret accepted by async key resolver

security
May 6, 2026

A critical authentication bypass vulnerability in the `fast-jwt` library allows attackers to forge valid JSON Web Tokens (JWTs, a standard format for securely transmitting user information) when an asynchronous key resolver function returns an empty string. The library incorrectly accepts an empty HMAC (a cryptographic signature method) secret and allows attackers to compute valid signatures with the empty key, bypassing authentication entirely on versions up to 6.2.3.

GitHub Advisory Database
04

Snap issues cautious guidance as Perplexity deal ends, Middle East 'geopolitical situation' causes uncertainty

industry
May 6, 2026

Snap reported first-quarter earnings that met revenue expectations but provided cautious guidance for the next quarter, partly due to ending its $400 million partnership with Perplexity (a generative AI startup that creates search engines). The company also cited uncertainty from the geopolitical situation in the Middle East as a factor affecting its sales outlook.

CNBC Technology
05

GHSA-xcmw-grxf-wjhj: PraisonAI has unauthenticated RCE via `tool_override.py` (CVE-2026-40287 patch bypass)

security
May 6, 2026

PraisonAI contains an unauthenticated remote code execution (RCE, where an attacker can run arbitrary commands on a server) vulnerability in the `tool_override.py` file that was missed during a previous security patch (CVE-2026-40287). An attacker can trigger this by sending a POST request to `/v1/recipes/run` with a malicious recipe, causing the server to execute a `tools.py` file without any authentication or security checks. The vulnerability affects version 4.6.31 and other recent versions.

Fix: The source text does not provide an explicit patch version, code fix, or mitigation strategy. N/A -- no mitigation discussed in source.

GitHub Advisory Database
06

GHSA-83vm-p52w-f9pw: vLLM: extract_hidden_states speculative decoding crashes server on any request with penalty parameters

security
May 6, 2026

In vLLM versions 0.18.0 through 0.19.1, a bug in the `extract_hidden_states` speculative decoding proposer (a component that predicts tokens ahead of time to speed up AI inference) causes the server to crash when any request includes sampling penalty parameters like `repetition_penalty`. The crash happens because the proposer returns a tensor (multi-dimensional array) with the wrong shape after the first step, causing a shape mismatch error when penalties are applied.

Fix: Fixed in vLLM v0.20.0 (PR #38610) by slicing the return value to `sampled_token_ids[:, :1]` to ensure the correct shape. If upgrading is not possible, either avoid using `extract_hidden_states` as the speculative decoding method, or strip penalty parameters (`repetition_penalty`, `frequency_penalty`, `presence_penalty`) from incoming requests at an API gateway before they reach vLLM.

GitHub Advisory Database
07

Google shuts down Project Mariner

industry
May 6, 2026

Google has shut down Project Mariner, an experimental AI feature that could automatically perform tasks for users across the web, as of May 4th, 2026. The company stated that the technology has been integrated into other Google AI products, particularly Gemini Agent (an AI that can perform multiple actions autonomously). Project Mariner was originally announced in December 2024 and could handle up to 10 tasks at once before being discontinued.

The Verge (AI)
08

New compliance guide available: ISO/IEC 42001:2023 on AWS

policy
May 6, 2026

AWS has released a compliance guide for ISO/IEC 42001:2023, which is an international standard for managing AI systems responsibly. The guide helps organizations design and operate an AI Management System (AIMS, a set of policies and controls for governing AI) on AWS by mapping the standard's requirements to specific AWS services and explaining how to collect evidence for compliance audits. While AWS provides secure infrastructure and tools, organizations remain responsible for defining their own AI governance scope, implementing the required controls, and proving they meet the standard during certification.

Fix: The guide provides implementation guidance including: mapping ISO 42001:2023 clauses 4-10 and Annex A controls to AWS services; recommendations for evidence collection, documentation, and audit readiness using AWS native tooling; and best practices for operationalizing AI compliance activities through automation and infrastructure-as-code. Organizations are directed to download the full ISO/IEC 42001:2023 on AWS Compliance Guide and contact AWS Security Assurance Services for further assistance.

AWS Security Blog
09

Anthropic, SpaceX announce compute deal that includes space development

industry
May 6, 2026

Anthropic announced a deal with SpaceX to use over 300 megawatts of compute capacity (computing power) from SpaceX's Colossus 1 data center in Memphis, Tennessee, with plans to develop gigawatts of capacity in space. This agreement aims to improve service for Anthropic's paid Claude Pro and Claude Max subscribers, following the company's recent statement that demand has strained its infrastructure and affected reliability during peak hours.

CNBC Technology
10

​​Microsoft named an overall leader in KuppingerCole Analyst’s 2026 Emerging AI Security Operations Center (SOC) report ​​

securityindustry
May 6, 2026

Modern security operations centers (SOCs, teams that monitor and respond to cyber attacks) are shifting from rule-based automation to AI-driven automation that helps human analysts make better decisions faster. Microsoft was named a leader in this space for evolving its security tools, including features like automatic attack response, AI-powered phishing detection, incident prioritization, and AI agents that can reason across multiple security signals and assist analysts with decision-making.

Microsoft Security Blog
Prev1...56789...371Next
critical

CVE-2026-42203: LiteLLM is a proxy server (AI Gateway) to call LLM APIs in OpenAI (or native) format. From version 1.80.5 to before vers

CVE-2026-42203NVD/CVE DatabaseMay 8, 2026
May 8, 2026
critical

Gemini CLI Vulnerability Could Have Led to Code Execution, Supply Chain Attack

SecurityWeekMay 7, 2026
May 7, 2026
critical

GHSA-9h64-2846-7x7f: Axonflow fixed bugs by implementing multi-tenant isolation and access-control hardening

GitHub Advisory DatabaseMay 6, 2026
May 6, 2026
critical

GHSA-gmvf-9v4p-v8jc: fast-jwt: JWT auth bypass due to empty HMAC secret accepted by async key resolver

CVE-2026-44351GitHub Advisory DatabaseMay 6, 2026
May 6, 2026