CVE-2025-24357 - VLLM Deserialization Code Execution Vulnerability

CVE ID : CVE-2025-24357 Published : Jan. 27, 2025, 6:15 p.m. | 59 minutes ago Description : vLLM is a library for LLM inference and serving. vllm/model_executor/weight_utils.py implements hf_model_weights_iterator to load the model checkpoint, which is downloaded from huggingface. It uses the torch.load function and the weights_only parameter defaults to False. When torch.load loads malicious pickle data, it will execute arbitrary code during unpickling. This vulnerability is fixed in v0.7.0. Severity: 7.5 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

Jan 27, 2025 - 20:15
 0  0
CVE-2025-24357 - VLLM Deserialization Code Execution Vulnerability
CVE ID : CVE-2025-24357
Published : Jan. 27, 2025, 6:15 p.m. | 59 minutes ago
Description : vLLM is a library for LLM inference and serving. vllm/model_executor/weight_utils.py implements hf_model_weights_iterator to load the model checkpoint, which is downloaded from huggingface. It uses the torch.load function and the weights_only parameter defaults to False. When torch.load loads malicious pickle data, it will execute arbitrary code during unpickling. This vulnerability is fixed in v0.7.0.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...