FKIE_CVE-2025-50461
Vulnerability from fkie_nvd - Published: 2025-08-19 14:15 - Updated: 2025-08-20 14:40
Severity ?
Summary
A deserialization vulnerability exists in Volcengine's verl 3.0.0, specifically in the scripts/model_merger.py script when using the "fsdp" backend. The script calls torch.load() with weights_only=False on user-supplied .pt files, allowing attackers to execute arbitrary code if a maliciously crafted model file is loaded. An attacker can exploit this by convincing a victim to download and place a malicious model file in a local directory with a specific filename pattern. This vulnerability may lead to arbitrary code execution with the privileges of the user running the script.
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A deserialization vulnerability exists in Volcengine\u0027s verl 3.0.0, specifically in the scripts/model_merger.py script when using the \"fsdp\" backend. The script calls torch.load() with weights_only=False on user-supplied .pt files, allowing attackers to execute arbitrary code if a maliciously crafted model file is loaded. An attacker can exploit this by convincing a victim to download and place a malicious model file in a local directory with a specific filename pattern. This vulnerability may lead to arbitrary code execution with the privileges of the user running the script."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de deserializaci\u00f3n en la versi\u00f3n 3.0.0 de Volcengine, espec\u00edficamente en el script scripts/model_merger.py al usar el backend \"fsdp\". El script llama a torch.load() con weights_only=False en archivos .pt proporcionados por el usuario, lo que permite a los atacantes ejecutar c\u00f3digo arbitrario si se carga un archivo de modelo malicioso. Un atacante puede explotar esto convenciendo a la v\u00edctima para que descargue y coloque un archivo de modelo malicioso en un directorio local con un patr\u00f3n de nombre de archivo espec\u00edfico. Esta vulnerabilidad puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario con los privilegios del usuario que ejecuta el script."
}
],
"id": "CVE-2025-50461",
"lastModified": "2025-08-20T14:40:17.713",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-08-19T14:15:39.533",
"references": [
{
"source": "cve@mitre.org",
"url": "https://github.com/Anchor0221/CVE-2025-50461"
},
{
"source": "cve@mitre.org",
"url": "https://github.com/pytorch/pytorch/blob/main/SECURITY.md#loading-untrusted-data"
},
{
"source": "cve@mitre.org",
"url": "https://github.com/volcengine/verl"
},
{
"source": "cve@mitre.org",
"url": "https://github.com/volcengine/verl/blob/main/scripts/model_merger.py#L152"
},
{
"source": "cve@mitre.org",
"url": "https://pytorch.org/docs/stable/generated/torch.load.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-77"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…