← All Insights

Agent Security Just Got Real CVEs

ai-securityagentsvulnerabilities

For the past year, the security conversation around AI agents has been mostly theoretical — research papers, conference talks, “what if an attacker could…” thought experiments. That changed this week.

Four CVEs dropped in CrewAI this week. The attack chain: prompt injection leads to remote code execution, server-side request forgery, and arbitrary file read — all through the Code Interpreter and default configurations. Real companies are running real workloads on CrewAI.

Alongside that, OpenClaw published a CVSS 9.9 privilege escalation affecting 135,000+ internet-facing instances. And Chrome’s Gemini Live panel has CVE-2026-0628, which lets a malicious extension hijack your AI assistant along with camera and microphone access.

If you run any of these, check your dependencies today — not this week, today.

The number that should change how you think about agentic system design: Google Mandiant’s M-Trends 2026 report puts median attacker breakout time at 22 seconds. Down from 8 hours.

That kills the human-in-the-loop argument as a security control. You cannot review and approve fast enough. If your threat model assumes a person catches the bad action before it executes, your threat model is broken.

These are infrastructure-grade problems. The frameworks getting these CVEs are being treated like weekend projects.

Source: Adversa AI — Top Agentic AI Security Resources, April 2026