aisecwatch.com
DashboardVulnerabilitiesNewsResearchArchiveStatsDatasetFor devs
Subscribe
aisecwatch.com

Real-time AI security monitoring. Tracking AI-related vulnerabilities, safety and security incidents, privacy risks, research developments, and policy changes.

Navigation

VulnerabilitiesNewsResearchDigest ArchiveNewsletter ArchiveSubscribeData SourcesStatisticsDatasetAPIIntegrationsWidgetRSS Feed

Maintained by

Truong (Jack) Luu

Information Systems Researcher

AI Sec Watch

The security intelligence platform for AI teams

AI security threats move fast and get buried under hype and noise. Built by an Information Systems Security researcher to help security teams and developers stay ahead of vulnerabilities, privacy incidents, safety research, and policy developments.

Independent research. No sponsors, no paywalls, no conflicts of interest.

[TOTAL_TRACKED]
3,710
[LAST_24H]
1
[LAST_7D]
1
Daily BriefingSaturday, May 16, 2026

No new AI/LLM security issues were identified today.

Latest Intel

page 77/371
VIEW ALL
01

GHSA-4ggg-h7ph-26qr: n8n-mcp has authenticated SSRF via instance-URL header in multi-tenant HTTP mode

security
Apr 8, 2026

n8n-mcp versions 2.47.3 and earlier have an authenticated SSRF vulnerability (server-side request forgery, where an attacker tricks a server into making requests to unintended locations) in multi-tenant HTTP mode. An attacker with a valid authentication token can make the server fetch arbitrary URLs and read the responses, potentially exposing cloud credentials (like AWS IMDS), internal network services, and other sensitive data the server can access.

Fix: Upgrade to n8n-mcp 2.47.4 or later (no configuration changes required). If you cannot upgrade immediately, the source explicitly mentions three workarounds: (1) use egress filtering to block outbound traffic from the n8n-mcp container to private IP ranges (RFC1918: 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16) and link-local 169.254.0.0/16; (2) disable multi-tenant headers by unsetting ENABLE_MULTI_TENANT and not accepting x-n8n-url / x-n8n-key headers at the reverse proxy if per-request instance switching is not needed; (3) restrict AUTH_TOKEN distribution to fully trusted operators only until you can upgrade.

GitHub Advisory Database
02

CVE-2026-34724: Zammad is a web based open source helpdesk/customer support system. Prior to 7.0.1, a server-side template injection vul

security
Apr 8, 2026

Zammad, a web-based customer support system, had a server-side template injection vulnerability (a flaw where attackers can inject malicious code into templates that the server processes) in versions before 7.0.1 that could lead to RCE (remote code execution, where an attacker can run commands on a system they don't own). The vulnerability only affects systems where an attacker has administrative access to control the type_enrichment_data configuration setting.

Fix: This vulnerability is fixed in version 7.0.1. Users should upgrade to Zammad 7.0.1 or later.

NVD/CVE Database
03

GHSA-hfvc-g4fc-pqhx: opentelemetry-go: BSD kenv command not using absolute path enables PATH hijacking

security
Apr 8, 2026

OpenTelemetry's Go SDK has a PATH hijacking vulnerability (PATH hijacking is when an attacker puts a malicious program in a directory that the system searches for commands, so their fake program runs instead of the real one) on BSD and Solaris systems because the `kenv` command is called by its name alone instead of its full path. An attacker with local access can place a malicious `kenv` binary in the system's PATH, which will execute with the application's permissions when OpenTelemetry initializes.

Fix: Use the absolute path `/bin/kenv` instead of the bare command name. Change line 42 in `sdk/resource/host_id.go` from `r.execCommand("kenv", "-q", "smbios.system.uuid")` to `r.execCommand("/bin/kenv", "-q", "smbios.system.uuid")`.

GitHub Advisory Database
04

GHSA-w8rr-5gcm-pp58: opentelemetry-go: OTLP HTTP exporters read unbounded HTTP response bodies

security
Apr 8, 2026

OpenTelemetry Go's OTLP HTTP exporters (tools that send trace, metric, and log data over HTTP) read entire HTTP response bodies into memory without limiting their size, which allows an attacker controlling the collector endpoint to crash the application by sending extremely large responses. This vulnerability affects three exporter components: otlptrace, otlpmetric, and otlplog.

Fix: Fixed in PR #8108 (https://github.com/open-telemetry/opentelemetry-go/pull/8108).

GitHub Advisory Database
05

GHSA-qf73-2hrx-xprp: PraisonAI has sandbox escape via exception frame traversal in `execute_code` (subprocess mode)

security
Apr 8, 2026

PraisonAI's `execute_code()` function has a critical sandbox escape vulnerability in its subprocess mode. The subprocess uses a blocklist of only 11 forbidden attributes, missing four key attributes (`__traceback__`, `tb_frame`, `f_back`, `f_builtins`) that attackers can chain together through exception handling to access the real Python builtins and execute arbitrary code, completely bypassing the sandbox.

GitHub Advisory Database
06

ReSLC: Defending backdoor attacks on intelligent vulnerability detection via redundant semantic LLM compression

securityresearch
Apr 8, 2026

This research paper describes a method called ReSLC that protects AI systems used to find software bugs from backdoor attacks, where attackers secretly embed malicious instructions into the AI's training process. The approach uses redundant semantic LLM compression (a technique that removes unnecessary information from large language models while keeping their core abilities) to make these hidden attacks harder to carry out. The work was published in July 2026 in the Journal of Information Security and Applications.

Elsevier Security Journals
07

Deep learning-based sequential detection of attacks on low-Latency network services

researchsecurity
Apr 8, 2026

This research paper presents a hybrid deep learning method using autoencoders (neural networks that learn to compress and reconstruct data) and transformers (AI models that process sequences of information) to detect a new type of attack called unresponsive ECN attacks on low-latency network services (systems designed to minimize delay in data transmission). The proposed method achieves over 90% accuracy in detecting these attacks while keeping false alarms below 0.01%, outperforming existing detection approaches by more than 10%.

Elsevier Security Journals
08

How botnet-driven DDoS attacks evolved in 2H 2025

security
Apr 8, 2026

In the second half of 2025, DDoS attacks (distributed denial-of-service, where attackers flood a target with traffic to shut it down) became more powerful and easier to launch due to three major changes: IoT botnets (networks of hacked internet-connected devices like routers) reached attack capacities of 30 terabits per second, AI and dark-web LLMs (large language models, AI systems trained on text data) made sophisticated attacks accessible to less-skilled attackers through simple conversational prompts, and DDoS-for-hire services became more widely available. Critical infrastructure like DNS servers (systems that translate website names into IP addresses) and government and finance sectors faced sustained pressure from groups coordinating attacks across multiple countries.

CSO Online
09

Meta debuts new AI model, attempting to catch Google, OpenAI after spending billions

industry
Apr 8, 2026

Meta has released Muse Spark, a new AI model designed to be small and efficient while still capable of reasoning through complex questions in science, math, and health. The model represents Meta's attempt to compete in the AI market dominated by OpenAI, Google, and Anthropic, and will be integrated into Meta's apps like Facebook, Instagram, and WhatsApp, with plans to offer API (application programming interface, a way for developers to access software features) access to external developers.

CNBC Technology
10

Meta is reentering the AI race with a new model called Muse Spark

industry
Apr 8, 2026

Meta has launched a new AI model called Muse Spark, designed specifically to work with Meta's products like WhatsApp, Instagram, Facebook, and Messenger. The model is now available in the Meta AI app and website in the US, with plans to expand to other countries and Meta's smart glasses in the coming weeks.

The Verge (AI)
Prev1...7576777879...371Next