<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Ai-Agent-Builder on ThreatNeuron</title>
    <link>https://thethreatneuron.in/tags/ai-agent-builder/</link>
    <description>Recent content in Ai-Agent-Builder on ThreatNeuron</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en</language>
    <copyright>© 2026 ThreatNeuron</copyright>
    <lastBuildDate>Sat, 11 Apr 2026 12:13:56 +0530</lastBuildDate><atom:link href="https://thethreatneuron.in/tags/ai-agent-builder/index.xml" rel="self" type="application/rss+xml" />
    
    <item>
      <title>Flowise CVE-2025-59528: CVSS 10.0 RCE Flaw Hits 15K AI Platforms</title>
      <link>https://thethreatneuron.in/blog/flowise-cve-2025-59528-rce-exploit-ai-agent-platforms-2026/</link>
      <pubDate>Sat, 11 Apr 2026 12:13:56 +0530</pubDate>
      
      <guid>https://thethreatneuron.in/blog/flowise-cve-2025-59528-rce-exploit-ai-agent-platforms-2026/</guid>
      <description>A maximum-severity RCE flaw in Flowise&amp;rsquo;s CustomMCP node is under active exploitation, putting thousands of AI workflow platforms at risk. Here&amp;rsquo;s what security teams need to know about CVE-2025-59528 and how to respond.</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://thethreatneuron.in/blog/flowise-cve-2025-59528-rce-exploit-ai-agent-platforms-2026/featured.png" />
    </item>
    
  </channel>
</rss>
