ASR AI Security Radar
Back to homepage

Recent AI Security Incidents

This archive includes all published incident pages. Page 15 of 18.

Each page is intended to help a security team answer three questions quickly: why the issue is AI-relevant, what part of the workflow may be exposed, and what actions should happen first.

Selection criteria and correction policy are documented in Methodology & Editorial Policy.

AI security incident: MagicLink: Insecure Deserialization of MagicLink Actions Leads to Remote Code Executi...

Incident date: February 12, 2026 | Published: February 25, 2026

Description MagicLink stores serialized action objects in the magic_links.action database column and deserializes them without integrity validation or class allowlisting in [src/MagicLink.php](src/MagicLink.

Read details

AI security incident: Arbitrary WASM Code Execution via AnnotationOverrideFlight Injection in Yoke ATC (GHS...

Incident date: February 12, 2026 | Published: February 25, 2026

Arbitrary WASM Code Execution via AnnotationOverrideFlight Injection in Yoke ATC This vulnerability exists in the Air Traffic Controller (ATC) component of Yoke, a Kubernetes deployment tool.

Read details

AI security incident: Unauthenticated Admission Webhook Endpoints in Yoke ATC (GHSA-965m-v4cc-6334)

Incident date: February 12, 2026 | Published: February 25, 2026

Unauthenticated Admission Webhook Endpoints in Yoke ATC This vulnerability exists in the Air Traffic Controller (ATC) component of Yoke, a Kubernetes deployment tool.

Read details

AI security incident: CediPay Affected by Improper Input Validation in Payment Processing (GHSA-wvr6-395c-5...

Incident date: February 12, 2026 | Published: February 25, 2026

A vulnerability in CediPay allows attackers to bypass input validation in the transaction API. Affected users: All deployments running versions prior to the patched release.

Read details

AI security incident: qs's arrayLimit bypass in comma parsing allows denial of service (GHSA-w7fw-mjwx-w883)

Incident date: February 12, 2026 | Published: February 25, 2026

Summary The arrayLimit option in qs does not enforce limits for comma-separated values when comma: true is enabled, allowing attackers to cause denial-of-service via memory exhaustion.

Read details

AI security incident: XWiki vulnerable to click-jacking through CSS injection in comments (GHSA-74rh-c5rh-8...

Incident date: February 12, 2026 | Published: February 25, 2026

Impact It's possible using comments to inject CSS that would transform the full wiki in a link area leading to a malicious page. All versions of XWiki are impacted by this kind of attack.

Read details

AI security incident: FrankenPHP's unicode case-folding length expansion causes incorrect split_path index...

Incident date: February 12, 2026 | Published: February 25, 2026

Summary FrankenPHP’s CGI path splitting logic improperly handles Unicode characters during case conversion. The logic computes the split index (for finding .

Read details

AI security incident: webtransport-go: Memory Exhaustion Attack due to Missing Cleanup of Streams Map (GHSA...

Incident date: February 12, 2026 | Published: February 25, 2026

Summary An attacker can cause unbounded memory consumption repeatedly creating and closing many WebTransport streams. Closed streams were not removed from an internal session map, preventing garbage collection of their resources.

Read details

AI security incident: webtransport-go: Memory Exhaustion Attack due to Missing Length Check in WT_CLOSE_SES...

Incident date: February 12, 2026 | Published: February 25, 2026

Summary An attacker can cause excessive memory consumption in webtransport-go's session implementation by sending a WT_CLOSE_SESSION capsule containing an excessively large Application Error Message.

Read details

AI security incident: CVE-2025-15556 (CISA KEV)

Incident date: February 12, 2026 | Published: February 25, 2026

Notepad++ Notepad++ - Notepad++ when using the WinGUp updater, contains a download of code without integrity check vulnerability that could allow an attacker to intercept or redirect update traffic to download and execute an...

Read details