Arbitrary Code Execution Vulnerability in PickleScan Affects PyTorch Models
CVE-2025-1945

5.3MEDIUM

Key Information:

Vendor

Mmaitre314

Vendor
CVE Published:
10 March 2025

What is CVE-2025-1945?

PickleScan versions prior to 0.0.23 are susceptible to an issue where it fails to properly detect malicious pickle files embedded within PyTorch model archives. Attackers can exploit this vulnerability by manipulating ZIP file header bits to include harmful pickle files that evade detection by PickleScan. When these compromised models are loaded using PyTorch's torch.load() function, it can result in the execution of arbitrary code, posing a significant security risk.

Affected Version(s)

picklescan 0.0.1 < 0.0.23

References

CVSS V4

Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Trevor Madge (@madgetr) of Sonatype
.