Cyber Posture

CVE-2026-5585

MediumPublic PoC

Published: 05 April 2026

Published
05 April 2026
Modified
30 April 2026
KEV Added
Patch
CVSS Score 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
EPSS Score 0.0001 2.2th percentile
Risk Priority 11 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-5585 is a medium-severity Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) vulnerability in Tencent Ai-Infra-Guard. Its CVSS base score is 5.3 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 2.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

This vulnerability is AI-related — categorised as Other AI Platforms.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AU-13 (Monitoring for Information Disclosure).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

AC-3 enforces approved authorizations for access to system resources like the Task Detail Endpoint, directly preventing unauthorized information disclosure due to improper access control.

prevent

SC-7 monitors and controls communications at external boundaries, blocking remote unauthenticated exploitation of the WebSocket endpoint.

detect

AU-13 specifically monitors for information disclosure events, enabling detection of unauthorized access to sensitive task details via the vulnerable endpoint.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The CVE describes a remote unauthenticated information disclosure vulnerability in a public-facing Task Detail Endpoint (WebSocket-based) of a web application, directly enabling exploitation of public-facing applications for initial access and sensitive data exposure.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A vulnerability was found in Tencent AI-Infra-Guard 4.0. The affected element is an unknown function of the file common/websocket/task_manager.go of the component Task Detail Endpoint. Performing a manipulation results in information disclosure. The attack may be initiated remotely. The exploit…

more

has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

Deeper analysisAI

CVE-2026-5585 is an information disclosure vulnerability in Tencent AI-Infra-Guard version 4.0, affecting an unknown function within the file common/websocket/task_manager.go of the Task Detail Endpoint component. Classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) and CWE-284 (Improper Access Control), it has a CVSS v3.1 base score of 5.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N), indicating medium severity with low confidentiality impact and no impact on integrity or availability.

The vulnerability can be exploited remotely by unauthenticated attackers with network access and no user interaction required. Manipulation of the affected endpoint leads to unauthorized disclosure of sensitive information, potentially exposing task details or related data managed via the WebSocket interface.

Advisories from VulDB, including entries at vuldb.com/vuln/355384 and related CTI pages, document the issue but note no vendor response despite early contact. References point to a public exploit gist at github.com/YLChen-007/fe4b834144ad535d167507c2008d4011, with no patches or specific mitigations disclosed.

Notable context includes the public availability of the exploit, enabling potential immediate use against exposed instances, and relevance to AI infrastructure through Tencent's AI-Infra-Guard, which may handle machine learning or AI task management workflows.

Details

CWE(s)

Affected Products

tencent
ai-infra-guard
4.0

AI Security AnalysisAI

AI Category
Other AI Platforms
Risk Domain
N/A
OWASP Top 10 for LLMs 2025
None mapped
Classification Reason
Matched keywords: ai

CVEs Like This One

CVE-2026-30855Same vendor: Tencent
CVE-2026-30860Same vendor: Tencent
CVE-2026-22687Same vendor: Tencent
CVE-2026-30858Same vendor: Tencent
CVE-2026-30247Same vendor: Tencent
CVE-2026-2148Shared CWE-200, CWE-284
CVE-2026-2055Shared CWE-200, CWE-284
CVE-2025-0481Shared CWE-200, CWE-284
CVE-2026-2054Shared CWE-200, CWE-284
CVE-2026-30861Same vendor: Tencent

References