{"uuid": "1a5a56ed-2894-4768-ba9a-b563329f8b01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-5173", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17530", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-5173\n\ud83d\udd25 CVSS Score: 4.8 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability has been found in HumanSignal label-studio-ml-backend up to 9fb7f4aa186612806af2becfb621f6ed8d9fdbaf and classified as problematic. Affected by this vulnerability is the function load of the file label-studio-ml-backend/label_studio_ml/examples/yolo/utils/neural_nets.py of the component PT File Handler. The manipulation of the argument path leads to deserialization. An attack has to be approached locally. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available.\n\ud83d\udccf Published: 2025-05-26T06:31:05.025Z\n\ud83d\udccf Modified: 2025-05-26T06:31:05.025Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.310261\n2. https://vuldb.com/?ctiid.310261\n3. https://vuldb.com/?submit.578126\n4. https://github.com/HumanSignal/label-studio-ml-backend/issues/765", "creation_timestamp": "2025-05-26T06:47:03.000000Z"}