CISO Daily Briefing — May 24, 2026

CISO Daily Briefing

Cloud Security Alliance — AI Safety Initiative Intelligence Report

Report Date
May 24, 2026
Intelligence Window
48 Hours
Priority Topics
5 Identified
Research Notes Queued
5 Overnight

Executive Summary

This cycle’s threat landscape is defined by nation-state exploitation of AI infrastructure: CISA confirmed Iranian actor MuddyWater is actively exploiting Langflow CVE-2025-34291, the first CISA KEV entry targeting an AI agent orchestration platform, providing a direct pathway into enterprise LLM workflows. Concurrently, the Megalodon campaign injected malicious GitHub Actions into 5,561 repositories within six hours, exfiltrating 449 GB of CI/CD secrets and OIDC tokens. Anthropic’s Project Glasswing disclosed 10,000+ high-severity vulnerabilities found in open-source projects in 30 days — faster than maintainers can patch, exposing a structural remediation crisis. The CISA Five Eyes agentic AI framework now sets the de facto compliance baseline for enterprise LLM agent deployments.

Overnight Research Output

1

Langflow CVE-2025-34291: AI Agent Platform Under Active State-Sponsored Exploitation

CRITICAL

Summary: CISA added CVE-2025-34291 to its Known Exploited Vulnerabilities catalog on May 22, confirming active exploitation by MuddyWater — an Iranian state-sponsored APT (APT34-adjacent). The vulnerability combines an overly permissive CORS configuration with SameSite=None refresh token cookies, enabling unauthenticated cross-origin remote code execution against Langflow instances. A compromised Langflow deployment creates a direct pathway to LLM prompt injection, training data exfiltration, and lateral movement into connected AI infrastructure. This is the first CISA KEV-listed vulnerability specifically targeting an AI agent orchestration platform — a threshold moment in AI infrastructure security.

Why This Matters: Any enterprise running Langflow for LLM workflow automation must patch immediately. Existing CVE response protocols do not address the distinct downstream risks of AI infrastructure compromise — including LLM output manipulation and training data exfiltration. Traditional web CVE guidance is insufficient for AI agent platforms that sit between enterprise models and production data with implicit elevated trust.

Read Full Research Note

2

Project Glasswing and the AI Vulnerability Disclosure Velocity Crisis

HIGH

Summary: Anthropic disclosed on May 23 that Project Glasswing — using Claude Mythos Preview across ~50 partner organizations — identified over 10,000 high and critical-severity vulnerabilities across 1,000+ open-source projects in under 30 days. Of 1,726 validated true positives, 1,094 are rated high or critical. Mozilla found and fixed 271 vulnerabilities in Firefox 150, versus 25 in a prior AI-assisted run. Open-source maintainers are now explicitly requesting slower disclosure pacing — a direct inversion of traditional responsible disclosure norms. WolfSSL CVE-2026-5194 (CVSS 9.1, certificate forgery) is one confirmed output.

Why This Matters: Organizations relying on widely-deployed open-source components must assume their attack surface is expanding at a rate no traditional patch management program can match. AI-accelerated discovery requires SLA recalibration, triage automation, and coordinated disclosure framework adaptation at industry-wide scale — a policy and operational challenge CSA research has not yet addressed.

View Full Research Note

3

Megalodon: Automated Mass Poisoning of CI/CD Pipelines via GitHub Actions

HIGH

Summary: On May 18, 2026, the Megalodon campaign simultaneously pushed 5,718 malicious commits to 5,561 GitHub repositories in under six hours, injecting GitHub Actions workflows designed to exfiltrate CI/CD secrets, cloud credentials (AWS, GCP, Azure via IMDS), OIDC tokens, SSH keys, and Kubernetes configurations to an attacker-controlled server. As of May 21, 449 GB across 575,352 files had been exfiltrated, with activity still ongoing. The attack requires only write access via a merged pull request from a fork — no repository owner credentials are needed. OIDC token theft is particularly severe: short-lived tokens that bypass standard credential rotation controls were among the targeted artifacts.

Why This Matters: Any organization with public or contributor-accessible GitHub repositories must audit merged pull requests for injected workflow modifications. Implement scoped token permissions, pinned action SHA hashing, and OIDC token scope restrictions immediately — particularly for repositories that contain or access cloud infrastructure credentials.

Read Full Research Note

4

CISA Agentic AI Guidance: Operationalizing the Five-Risk Framework

HIGH

Summary: On May 1, 2026, CISA and Five Eyes partner agencies (NSA, NCSC-UK, ASD ACSC, NCSC-NZ, CCCS) released Careful Adoption of Agentic AI Services — the first authoritative international guidance specifically addressing agentic AI security. The framework defines five risk categories: privilege escalation, design and configuration failures, behavioral misalignment, structural brittleness, and accountability gaps. Enterprises are expected to begin with low-risk, non-sensitive use cases before expanding agentic AI access. This guidance represents the closest thing to a regulatory expectation for LLM agent production deployments, and most organizations currently lack the required access controls and audit logging to demonstrate compliance.

Why This Matters: Enterprises deploying AI agents in production now have a documented government standard against which they will be measured. The five-risk framework requires concrete access-control architectures, behavioral monitoring instrumentation, and audit logging that most organizations have not yet implemented. A CSA research note mapping the framework to MAESTRO layers and AICM controls would bridge government guidance to cloud-native implementation.

Read Full Research Note

5

TeamPCP (UNC6780): The AI Developer Ecosystem’s Most Active Supply Chain Adversary

HIGH

Summary: Google Threat Intelligence Group formally tracks TeamPCP as UNC6780, a financially motivated threat actor executing the most sustained and diverse software supply chain campaign of 2026. In Wave 4 alone (May 19), the group simultaneously compromised Microsoft’s durabletask Python SDK on PyPI, poisoned a VSCode extension with 2.2 million installs, and compromised @antv namespace npm packages — leading GitHub to confirm exfiltration of approximately 3,800 internal repositories. Prior waves targeted LiteLLM, Docker Hub security utilities, Trivy, and LangChain-adjacent packages. This actor has industrialized supply chain compromise and is deliberately concentrating attacks on the open-source AI development stack.

Why This Matters: TeamPCP represents a persistent, formally attributed threat actor specifically targeting the open-source AI developer stack. No single patch addresses this risk. Enterprises must treat npm, PyPI, and Docker Hub packages as untrusted infrastructure and implement dependency integrity verification, provenance attestation, and behavioral monitoring across all CI/CD pipelines touching AI middleware.

View Full Research Note

Notable News & Signals

CISA Contractor Leaked AWS GovCloud Keys in Public GitHub Repo for 6 Months

A Nightwing contractor’s “Private-CISA” GitHub repository — publicly accessible from November 2025 until mid-May 2026 — exposed administrative credentials for three CISA AWS GovCloud environments, plaintext passwords for internal systems, and detailed CI/CD pipeline configurations. The contractor had disabled GitHub’s default secret-blocking setting. Lawmakers have requested a classified briefing.

LiteSpeed cPanel Plugin CVE-2026-48172 (CVSS 10.0) Exploited for Root Access

A maximum-severity privilege escalation flaw in the LiteSpeed cPanel plugin (versions 2.3–2.4.4) allows any logged-in cPanel user to execute arbitrary scripts as root via a logic flaw in the lsws.redisAble JSON-API endpoint. Actively exploited; patch to v2.4.7+ immediately.

Drupal Core CVE-2026-9082 SQL Injection Added to CISA KEV

CISA added this unauthenticated SQL injection vulnerability in Drupal Core’s PostgreSQL EntityQuery handler to the KEV catalog on May 22. Imperva reports 15,000+ attack attempts against 6,000 sites across 65 countries. Affects only PostgreSQL-backed Drupal instances; patched in versions 10.4.10, 10.5.10, 11.2.12, and 11.3.10.

npm Staged Publishing + 2FA-Gated Controls Now Generally Available

GitHub’s new staged publishing workflow for npm requires a human maintainer to pass a 2FA challenge before a package version goes live. Paired with trusted OIDC publishing, this means CI-automated publishes stage in a queue for human approval — directly addressing the TeamPCP-class threat of automated package poisoning. Three new install-source flags also restrict which package origins can be consumed during builds.

Topics Already Covered — No New Action Required

  • npm Staged Publishing / 2FA-Gated Controls: Valuable supply chain hardening news, but primarily a vendor feature announcement. Adjacent to workload identity coverage in CSA_research_note_workload-identity-federation-vs-api-keys_20260522.
  • Drupal Core CVE-2026-9082 SQL Injection: Active CISA KEV exploitation confirmed, but this is a traditional web application vulnerability without AI-specific dimensions. Outside the AI Safety Initiative portfolio scope.
  • LiteSpeed cPanel Plugin CVE-2026-48172 (CVSS 10.0): Maximum severity, actively exploited — but in the infrastructure/web server category without AI-specific relevance to this initiative.
  • CISA Private-CISA Contractor GitHub Credential Leak: Compelling insider/contractor risk story. The CI/CD credentials-in-public-repo angle is better addressed by the Megalodon topic (Topic 3), which covers the broader attack class more instructively.
  • Packagist/Laravel-Lang Supply Chain Attack: Covered thematically by the TeamPCP strategic risk topic (Topic 5). A second PHP supply chain note would create redundancy without adding AI-specific value to this portfolio.

← Back to Research Index