{"uuid": "83d90084-382f-4583-940c-a7aab4b8e2c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-RH4J-5RHW-HR54", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3179", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: GHSA-rh4j-5rhw-hr54\n\ud83d\udd25 CVSS Score: 7.5 (CVSS_V3)\n\ud83d\udd39 Description: ### Description\nThe vllm/model_executor/weight_utils.py implements hf_model_weights_iterator to load the model checkpoint, which is downloaded from huggingface. It use torch.load function and weights_only parameter is default value False. There is a security warning on https://pytorch.org/docs/stable/generated/torch.load.html, when torch.load load a malicious pickle data it will execute arbitrary code during unpickling.\n\n### Impact\nThis vulnerability can be exploited to execute arbitrary codes and OS commands in the victim machine who fetch the pretrained repo remotely.\n\nNote that most models now use the safetensors format, which is not vulnerable to this issue.\n\n### References\n* https://pytorch.org/docs/stable/generated/torch.load.html\n* Fix: https://github.com/vllm-project/vllm/pull/12366\n\ud83d\udccf Published: 2025-01-27T20:50:30Z\n\ud83d\udccf Modified: 2025-01-27T20:50:30Z\n\ud83d\udd17 References:\n1. https://github.com/vllm-project/vllm/security/advisories/GHSA-rh4j-5rhw-hr54\n2. https://nvd.nist.gov/vuln/detail/CVE-2025-24357\n3. https://github.com/vllm-project/vllm/pull/12366\n4. https://github.com/vllm-project/vllm/commit/d3d6bb13fb62da3234addf6574922a4ec0513d04\n5. https://github.com/vllm-project/vllm\n6. https://github.com/vllm-project/vllm/releases/tag/v0.7.0\n7. https://pytorch.org/docs/stable/generated/torch.load.html", "creation_timestamp": "2025-01-27T21:08:26.000000Z"}