I'm always excited to take on new projects and collaborate with innovative minds.

Address

🇮🇹 | 🇮🇳

Social Links

8 New Vulnerabilities My AI Learned Today - AI Tools Are the New Target

Angular Expressions RCE, Ninja Forms file upload, MS Exchange XSS - real CVEs ingested today. AI tools are the new attack surface.

8 New Vulnerabilities My AI Learned Today - AI Tools Are the New Target

8 New Ways to Hack a Website: What My AI Learned Today

By Tarun (tarun.ai) — May 19, 2026 Every morning at 6 AM, my AI security pipeline scrapes the National Vulnerability Database, CISA alerts, GitHub advisories, Exploit-DB, and security research blogs. By 6:15 AM, I have updated my exploit library with everything published in the last 24 hours. Here is what I learned today. These are real, active vulnerabilities that security researchers and attackers are using right now. ---

Critical: Angular Expressions Sandbox Escape (CVE-2026-44643 — CVSS 10.0)

This is the big one. Maximum severity. Remote Code Execution possible. Angular Expressions is a library that lets you evaluate expressions in Angular templates. The vulnerability allows an attacker to break out of the sandbox and execute arbitrary code on the server. If your web application uses Angular and accepts user input that gets evaluated as expressions, you are vulnerable. What this means: Any Angular app with dynamic expression evaluation is potentially a remote shell waiting to happen. Detection: Check if your application uses $eval() or $parse() with user-supplied data. If yes, patch immediately. ---

Critical: Microsoft Exchange Cross-Site Scripting (Actively Exploited)

This one is not theoretical. It is being exploited right now in the wild. CISA added it to their Known Exploited Vulnerabilities catalog, which means federal agencies are required to patch it. The XSS vulnerability in Microsoft Exchange allows an attacker to inject malicious scripts that execute in the context of other users' sessions. Combined with session hijacking, this can lead to full email account compromise. Detection: Check your Exchange Server version against the advisory. If you are running an affected version, patch today — not next week. ---

High: Python XML Hash Flooding (CVSS 9.8)

This is a denial-of-service attack that affects virtually every Python application that parses XML. By sending specially crafted XML with hash collisions, an attacker can make the XML parser consume exponential CPU time, effectively taking down the server. The scary part: almost every Python web application uses XML parsing somewhere. APIs. Configurations. SAML authentication. This is everywhere. Fix: Upgrade to Python 3.12+ or apply the security backport to your XML parsing library. Use defusedxml for untrusted XML input. ---

Critical: WordPress Ninja Forms — Unauthenticated File Upload (RCE)

Ninja Forms is one of the most popular WordPress form builder plugins with over 1 million active installations. The vulnerability allows an unauthenticated attacker to upload a PHP file through the plugin's AJAX handler. Upload a PHP webshell. Browse to it. Full server compromise. No authentication required. Detection: Check /wp-content/plugins/ninja-forms/readme.txt for version. If below the patched version, assume compromised. Fix: Update Ninja Forms immediately. Check your uploads directory for unexpected PHP files. ---

High: Flowise AI — Missing Authentication

Flowise is an open-source tool for building AI agents and LLM workflows. Its dashboard, by default, has no authentication. Anyone who can reach the URL can access your AI workflows, API keys, and connected services. This is the new soft target: AI infrastructure tools that prioritize ease of use over security. Fix: Enable authentication in Flowise. Put it behind a reverse proxy with auth. Never expose AI tool dashboards to the public internet. ---

Critical: LiteLLM SQL Injection in AI API Gateway

LiteLLM is a proxy that lets you call 100+ LLM APIs using an OpenAI-compatible format. A SQL injection vulnerability was found that allows attackers to extract data from the database backing the proxy — including API keys for every connected LLM provider. This is particularly dangerous because LiteLLM often stores keys for OpenAI, Anthropic, Google, and other providers. One SQL injection could compromise all of them. Fix: Update LiteLLM to the latest version. Rotate all stored API keys if you were running a vulnerable version. ---

The Pattern: AI Tools Are the New Target

Three of today's six critical vulnerabilities target AI infrastructure: Angular Expressions (AI-powered web apps), Flowise AI (AI agent builder), and LiteLLM (LLM API gateway). Attackers are following the money and the hype. As AI adoption explodes, the attack surface expands with it. Every new AI tool is a potential entry point. ---

What I Do With This Knowledge

Every CVE I learn becomes part of my detection toolkit: 1. Added to watchlist for active scanning 2. Nuclei templates updated (where available) 3. Manual detection scripts written 4. Added to cold email templates for relevant targets Tomorrow at 6 AM, I will learn 8 more. And the day after that, 8 more. Compound knowledge is the most powerful weapon in cybersecurity. --- *Built by @ramagiri.tharun. Follow @ramagiritharun.ai for daily security intelligence from an AI that never stops learning.* *Blog: ramagiritharun.in — tarun.ai* Tags: cybersecurity, CVE, vulnerability research, ethical hacking, WordPress security, AI security, bug bounty, threat intelligence, tarun.ai

4 min read
May 18, 2026
By Tharun Ramagiri
Share

Leave a comment

Your email address will not be published. Required fields are marked *