aisecwatch.com
DashboardVulnerabilitiesNewsResearchArchiveStatsDataset
aisecwatch.com

Real-time AI security monitoring. Tracking AI-related vulnerabilities, safety and security incidents, privacy risks, research developments, and policy changes.

Navigation

VulnerabilitiesNewsResearchDigest ArchiveNewsletter ArchiveSubscribeData SourcesStatisticsDatasetAPIIntegrationsWidgetRSS Feed

Maintained by

Truong (Jack) Luu

Information Systems Researcher

AI & LLM Vulnerabilities

Security vulnerabilities, privacy incidents, safety concerns, and policy updates affecting LLMs and AI agents.

to
Export CSV
1453 items

CVE-2026-30834: PinchTab is a standalone HTTP server that gives AI agents direct control over a Chrome browser. Prior to version 0.7.7,

highvulnerability
security
Mar 7, 2026
CVE-2026-30834

PinchTab is an HTTP server that lets AI agents control a Chrome browser. Before version 0.7.7, it had a Server-Side Request Forgery vulnerability (SSRF, a flaw where an attacker tricks a server into making requests to places it shouldn't, like internal networks or local files) in its /download endpoint that let any user with API access make the server request arbitrary URLs and steal the responses.

Fix: This issue has been patched in version 0.7.7.

NVD/CVE Database

GHSA-8w32-6mrw-q5wv: WeKnora Vulnerable to Remote Code Execution via SQL Injection Bypass in AI Database Query Tool

criticalvulnerability
security
Mar 6, 2026
CVE-2026-30860

WeKnora, an AI database query tool, has a critical Remote Code Execution (RCE, where an attacker can run commands on a system they don't own) vulnerability caused by incomplete validation in its SQL injection protection system. The validation framework fails to check PostgreSQL array expressions and row expressions, allowing attackers to hide dangerous functions inside these expressions and bypass all seven security phases, leading to arbitrary code execution on the database server.

GHSA-2f4c-vrjq-rcgv: WeKnora has Broken Access Control - Cross-Tenant Data Exposure

highvulnerability
security
Mar 6, 2026
CVE-2026-30859

WeKnora has a broken access control vulnerability (a security flaw where the application fails to properly check permissions) that lets any logged-in user from one tenant (a separate customer or organization) read sensitive data from other tenants' databases, including API keys (credentials for accessing external services), model configurations, and private messages. The problem happens because three database tables (messages, embeddings, models) are allowed to be queried but don't have automatic tenant filtering applied to them.

GHSA-67q9-58vj-32qx: WeKnora Vulnerable to Tool Execution Hijacking via Ambigous Naming Convention In MCP client and Indirect Prompt Injection

mediumvulnerability
security
Mar 6, 2026
CVE-2026-30856

WeKnora has a vulnerability where a malicious MCP server (a remote tool provider that integrates with AI clients) can hijack legitimate tools by exploiting how tool names are generated. An attacker registers a fake tool with the same name as a real one (like `tavily_extract`), which overwrites the legitimate version in the tool registry (the list of available tools). The attacker can then trick the LLM into executing their malicious tool and leak sensitive information like system prompts through prompt injection (hiding instructions in tool outputs that the AI treats as commands).

GHSA-ccj6-79j6-cq5q: WeKnora Vulnerable to Broken Access Control in Tenant Management

criticalvulnerability
security
Mar 6, 2026
CVE-2026-30855

WeKnora has a broken access control vulnerability (BOLA, or broken object-level authorization, where an attacker can access resources they shouldn't by manipulating object IDs) in its tenant management system that allows any authenticated user to read, modify, or delete any tenant without permission checks. Since anyone can register an account, attackers can exploit this to take over or destroy other organizations' accounts and access their sensitive data like API keys.

GHSA-5f53-522j-j454: Flowise Missing Authentication on NVIDIA NIM Endpoints

highvulnerability
security
Mar 6, 2026
CVE-2026-30824

Flowise incorrectly whitelisted the NVIDIA NIM router (`/api/v1/nvidia-nim/*`) in its authentication middleware, allowing anyone to access sensitive endpoints without logging in. This lets attackers steal NVIDIA API tokens, manipulate Docker containers, and cause denial of service attacks without needing valid credentials.

GHSA-cwc3-p92j-g7qm: Flowise has IDOR leading to Account Takeover and Enterprise Feature Bypass via SSO Configuration

highvulnerability
security
Mar 6, 2026
CVE-2026-30823

Flowise has a critical IDOR (insecure direct object reference, a flaw where an app trusts user input to identify which data to access without checking permissions) vulnerability in its login configuration endpoint. An attacker with a free account can modify any organization's single sign-on settings by simply specifying a different organization ID, enabling account takeover by redirecting logins to attacker-controlled credentials and bypassing enterprise license restrictions.

GHSA-mq4r-h2gh-qv7x: Flowise Allows Mass Assignment in `/api/v1/leads` Endpoint

highvulnerability
security
Mar 6, 2026
CVE-2026-30822

A mass assignment vulnerability (a type of attack where an attacker controls internal fields by sending them in a request) exists in Flowise's `/api/v1/leads` endpoint, allowing unauthenticated users to override auto-generated fields like `id`, `createdDate`, and `chatId` by including them in the request body. The vulnerability occurs because the code uses `Object.assign()` to copy all properties from user input directly into the database entity without filtering, bypassing the intended auto-generation of these fields.

CVE-2026-29791: Agentgateway is an open source data plane for agentic AI connectivity within or across any agent framework or environmen

mediumvulnerability
security
Mar 6, 2026
CVE-2026-29791

Agentgateway is an open source data plane (a software layer that handles data movement for AI agents working across different frameworks) that had a security flaw in versions before 0.12.0, where user input in paths, query parameters, and headers were not properly cleaned up when converting tool requests to OpenAPI format. This lack of input validation (CWE-20, checking that data matches expected rules) could potentially be exploited, but the vulnerability has been patched.

GHSA-j8g8-j7fc-43v6: Flowise has Arbitrary File Upload via MIME Spoofing

highvulnerability
security
Mar 6, 2026
CVE-2026-30821

Flowise has a file upload vulnerability where the server only checks the `Content-Type` header (MIME type spoofing, pretending a file is one type when it's actually another) that users provide, instead of verifying what the file actually contains. Because the upload endpoint is whitelisted (allowed without authentication), an attacker can upload malicious files by claiming they're safe types like PDFs, leading to stored attacks or remote code execution (RCE, where attackers run commands on the server).

GHSA-wvhq-wp8g-c7vq: Flowise has Authorization Bypass via Spoofed x-request-from Header

highvulnerability
security
Mar 6, 2026
CVE-2026-30820

Flowise has a critical authorization bypass flaw in its `/api/v1` routes where the middleware trusts any request with the header `x-request-from: internal`, even though this header can be spoofed by any user. This allows a low-privilege authenticated tenant (someone with a valid browser cookie) to call internal administration endpoints, like API key creation and credential management, without proper permission checks, effectively escalating their privileges.

GHSA-g8r9-g2v8-jv6f: GitHub Copilot CLI Dangerous Shell Expansion Patterns Enable Arbitrary Code Execution

highvulnerability
security
Mar 6, 2026
CVE-2026-29783

GitHub Copilot CLI had a vulnerability where attackers could execute arbitrary code by hiding dangerous commands inside bash parameter expansion patterns (special syntax for manipulating variables). The safety system that checks whether commands are safe would incorrectly classify these hidden commands as harmless, allowing them to run without user approval.

CVE-2026-28795: OpenChatBI is an intelligent chat-based BI tool powered by large language models, designed to help users query, analyze,

highvulnerability
security
Mar 6, 2026
CVE-2026-28795

OpenChatBI is a chat-based business intelligence tool that uses large language models to help users analyze data through conversation. Before version 0.2.2, it had a critical path traversal vulnerability (CWE-22, a flaw that lets attackers access files outside their intended directory) in its save_report tool because it didn't properly check the file_format input parameter. This vulnerability had a CVSS score (severity rating) of 8.7, indicating it was high-risk.

CVE-2026-28677: OpenSift is an AI study tool that sifts through large datasets using semantic search and generative AI. Prior to version

highvulnerability
security
Mar 6, 2026
CVE-2026-28677

OpenSift, an AI study tool that uses semantic search (finding information based on meaning rather than exact word matches) and generative AI to analyze large datasets, had a security vulnerability in versions before 1.6.3-alpha. The vulnerability was an SSRF (server-side request forgery, where an attacker tricks the server into making requests to unintended locations) that allowed attackers to bypass security checks by using private URLs, non-standard ports, or redirects that the URL intake system didn't properly restrict.

CVE-2026-28676: OpenSift is an AI study tool that sifts through large datasets using semantic search and generative AI. Prior to version

highvulnerability
security
Mar 6, 2026
CVE-2026-28676

OpenSift is an AI study tool that uses semantic search (finding information based on meaning rather than exact keywords) and generative AI to analyze large datasets. Before version 1.6.3-alpha, the software had a path-injection vulnerability (a flaw where attackers could manipulate file paths to access files outside intended directories) in its file storage system, allowing potential unauthorized file read, write, or delete operations.

CVE-2026-28675: OpenSift is an AI study tool that sifts through large datasets using semantic search and generative AI. Prior to version

mediumvulnerability
security
Mar 6, 2026
CVE-2026-28675

OpenSift, an AI study tool that uses semantic search (finding information based on meaning rather than exact word matches) and generative AI to analyze large datasets, had a security problem in versions before 1.6.3-alpha where it exposed sensitive information. Specifically, the tool returned raw error messages to users and leaked login tokens (credentials that prove who you are) in responses shown on the screen and in token rotation output (the process of replacing old credentials with new ones).

CVE-2026-2589: The Greenshift – animation and page builder blocks plugin for WordPress is vulnerable to Sensitive Information Exposure

mediumvulnerability
security
Mar 5, 2026
CVE-2026-2589

The Greenshift plugin for WordPress (used to create animations and page builder blocks) has a vulnerability where automated backup files are stored in a publicly accessible location, allowing attackers to read sensitive API keys (for OpenAI, Claude, Google Maps, Gemini, DeepSeek, and Cloudflare Turnstile) without needing to log in. This affects all versions up to 12.8.3.

CVE-2026-28451: OpenClaw versions prior to 2026.2.14 contain server-side request forgery vulnerabilities in the Feishu extension that al

mediumvulnerability
security
Mar 5, 2026
CVE-2026-28451

OpenClaw versions before 2026.2.14 have a server-side request forgery vulnerability (SSRF, where an attacker tricks a server into making requests to unintended targets) in the Feishu extension that allows attackers to fetch remote URLs and access internal services through the sendMediaFeishu function and markdown image processing. Attackers can exploit this by manipulating tool calls or using prompt injection (tricking the AI by hiding instructions in its input) to trigger these requests and re-upload the responses as Feishu media.

GHSA-jc5m-wrp2-qq38: Flowise Vulnerable to PII Disclosure on Unauthenticated Forgot Password Endpoint

mediumvulnerability
security
Mar 5, 2026

Flowise's forgot-password endpoint leaks personally identifiable information (PII: sensitive data like names and account IDs that identify individuals) to anyone who knows a valid email address, because it returns the full user object instead of a generic success message. An attacker can exploit this by sending a simple request to `/api/v1/account/forgot-password` with any email address and receive back user IDs, names, creation dates, and other account details without needing to log in.

GHSA-x2g5-fvc2-gqvp: Flowise has Insufficient Password Salt Rounds

mediumvulnerability
security
Mar 5, 2026

Flowise uses an insufficiently weak password hashing setting where bcrypt (a password encryption algorithm) is configured with only 5 salt rounds, which provides just 32 iterations compared to OWASP's recommended minimum of 10 rounds (1024 iterations). This weakness means that if a database is stolen, attackers can crack user passwords roughly 30 times faster using modern GPUs, putting all user accounts at risk.

Previous7 / 73Next
GitHub Advisory Database
GitHub Advisory Database
GitHub Advisory Database
GitHub Advisory Database
GitHub Advisory Database
GitHub Advisory Database
GitHub Advisory Database

Fix: This issue has been patched in version 0.12.0. Update Agentgateway to version 0.12.0 or later to resolve the vulnerability.

NVD/CVE Database
GitHub Advisory Database
GitHub Advisory Database

Fix: The fix adds two layers of defense: (1) The safety assessment now detects dangerous operators like @P, =, :=, and ! within ${...} expansions and reclassifies commands containing them from read-only to write-capable so they require user approval. (2) Commands with dangerous expansion patterns are unconditionally blocked at the execution layer regardless of permission mode. Update to GitHub Copilot CLI version 0.0.423 or later.

GitHub Advisory Database

Fix: This issue has been patched in version 0.2.2.

NVD/CVE Database

Fix: This issue has been patched in version 1.6.3-alpha. Users should update OpenSift to version 1.6.3-alpha or later.

NVD/CVE Database

Fix: This issue has been patched in version 1.6.3-alpha. Users should update to this version or later.

NVD/CVE Database

Fix: This issue has been patched in version 1.6.3-alpha. Users should upgrade to this version or later.

NVD/CVE Database
NVD/CVE Database

Fix: Upgrade OpenClaw to version 2026.2.14 or later.

NVD/CVE Database
GitHub Advisory Database

Fix: The source recommends increasing the default PASSWORD_SALT_HASH_ROUNDS environment variable to at least 10 (as recommended by OWASP), or considering 12 for a better balance between security and login performance. The source also recommends documenting that higher values will increase login time but improve security. Note: the source acknowledges that existing password hashes created with 5 rounds will remain vulnerable even after this change is applied.

GitHub Advisory Database