ASR AI Security Radar
Back to homepage

Recent AI Security Incidents

This archive includes all published incident pages. Page 9 of 16.

Each page is intended to help a security team answer three questions quickly: why the issue is AI-relevant, what part of the workflow may be exposed, and what actions should happen first.

Selection criteria and correction policy are documented in Methodology & Editorial Policy.

AI security incident: Fabric.js Affected by Stored XSS via SVG Export (GHSA-hfvx-25r5-qc3w)

Incident date: February 18, 2026 | Published: February 25, 2026

fabric.js applies escapeXml() to text content during SVG export ( src/shapes/Text/TextSVGExportMixin.ts:186 ) but fails to apply it to other user-controlled string values that are interpolated into SVG attribute markup.

Read details

AI security incident: OpenClaw session tool visibility hardening and Telegram webhook secret fallback (GHSA...

Incident date: February 18, 2026 | Published: February 25, 2026

Vulnerability In some shared-agent deployments, OpenClaw session tools ( sessions_list , sessions_history , sessions_send ) allowed broader session targeting than some operators intended.

Read details

AI security incident: OpenClaw: Docker container escape via unvalidated bind mount config injection (GHSA-w...

Incident date: February 18, 2026 | Published: February 25, 2026

Summary A configuration injection issue in the Docker tool sandbox could allow dangerous Docker options (bind mounts, host networking, unconfined profiles) to be applied, enabling container escape or host data access.

Read details

AI security incident: Keras has a Local File Disclosure via HDF5 External Storage During Keras Weight Loadi...

Incident date: February 18, 2026 | Published: February 25, 2026

Summary TensorFlow / Keras continues to honor HDF5 “external storage” and ExternalLink features when loading weights. A malicious .weights.h5 (or a .

Read details

AI security incident: RediSearch Query Injection in @langchain/langgraph-checkpoint-redis (GHSA-5mx2-w598-3...

Incident date: February 18, 2026 | Published: February 25, 2026

Summary A query injection vulnerability exists in the @langchain/langgraph-checkpoint-redis package's filter handling.

Read details

AI security incident: minimatch has a ReDoS via repeated wildcards with non-matching literal in pattern (GH...

Incident date: February 18, 2026 | Published: February 25, 2026

Summary minimatch is vulnerable to Regular Expression Denial of Service (ReDoS) when a glob pattern contains many consecutive * wildcards followed by a literal character that doesn't appear in the test string.

Read details

AI security incident: Command Injection via Unsanitized `locate` Output in `versions()` — systeminformation...

Incident date: February 18, 2026 | Published: February 25, 2026

Command Injection via Unsanitized locate Output in versions() — systeminformation **Package:** systeminformation (npm) **Tested Version:** 5.30.

Read details

AI security incident: Go Ethereum affected by DoS via malicious p2p message (GHSA-2gjw-fg97-vg3r)

Incident date: February 18, 2026 | Published: February 25, 2026

Impact A vulnerable node can be forced to shutdown/crash using a specially crafted message. More details to be released later. ### Patches The problem is resolved in the v1.16.9 and v1.17.0 releases of Geth.

Read details

AI security incident: LibreNMS: SQL Injection in ajax_table.php spreads through a covert data stream. (GHSA...

Incident date: February 18, 2026 | Published: February 25, 2026

Summary *SQL Injection in IPv6 Address Search functionality via address parameter** A SQL injection vulnerability exists in the ajax_table.php endpoint.

Read details

AI security incident: LibreNMS has a Stored XSS in Custom OID - unit parameter missing strip_tags() (GHSA-f...

Incident date: February 18, 2026 | Published: February 25, 2026

Summary The unit parameter in Custom OID functionality lacks strip_tags() sanitization while other fields ( name , oid , datatype ) are sanitized.

Read details