CVE-2026-5585
Published: 05 April 2026
Summary
CVE-2026-5585 is a medium-severity Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) vulnerability in Tencent Ai-Infra-Guard. Its CVSS base score is 5.3 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 2.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
This vulnerability is AI-related — categorised as Other AI Platforms.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AU-13 (Monitoring for Information Disclosure).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
AC-3 enforces approved authorizations for access to system resources like the Task Detail Endpoint, directly preventing unauthorized information disclosure due to improper access control.
SC-7 monitors and controls communications at external boundaries, blocking remote unauthenticated exploitation of the WebSocket endpoint.
AU-13 specifically monitors for information disclosure events, enabling detection of unauthorized access to sensitive task details via the vulnerable endpoint.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The CVE describes a remote unauthenticated information disclosure vulnerability in a public-facing Task Detail Endpoint (WebSocket-based) of a web application, directly enabling exploitation of public-facing applications for initial access and sensitive data exposure.
NVD Description
A vulnerability was found in Tencent AI-Infra-Guard 4.0. The affected element is an unknown function of the file common/websocket/task_manager.go of the component Task Detail Endpoint. Performing a manipulation results in information disclosure. The attack may be initiated remotely. The exploit…
more
has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Deeper analysisAI
CVE-2026-5585 is an information disclosure vulnerability in Tencent AI-Infra-Guard version 4.0, affecting an unknown function within the file common/websocket/task_manager.go of the Task Detail Endpoint component. Classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) and CWE-284 (Improper Access Control), it has a CVSS v3.1 base score of 5.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N), indicating medium severity with low confidentiality impact and no impact on integrity or availability.
The vulnerability can be exploited remotely by unauthenticated attackers with network access and no user interaction required. Manipulation of the affected endpoint leads to unauthorized disclosure of sensitive information, potentially exposing task details or related data managed via the WebSocket interface.
Advisories from VulDB, including entries at vuldb.com/vuln/355384 and related CTI pages, document the issue but note no vendor response despite early contact. References point to a public exploit gist at github.com/YLChen-007/fe4b834144ad535d167507c2008d4011, with no patches or specific mitigations disclosed.
Notable context includes the public availability of the exploit, enabling potential immediate use against exposed instances, and relevance to AI infrastructure through Tencent's AI-Infra-Guard, which may handle machine learning or AI task management workflows.
Details
- CWE(s)
Affected Products
AI Security AnalysisAI
- AI Category
- Other AI Platforms
- Risk Domain
- N/A
- OWASP Top 10 for LLMs 2025
- None mapped
- Classification Reason
- Matched keywords: ai