PT-2025-17312 · Pytorch +1 · Pytorch +1
Azraelxuemo
·
Published
2024-11-07
·
Updated
2025-07-16
·
CVE-2025-32434
10
Critical
Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
**Name of the Vulnerable Software and Affected Versions:**
PyTorch versions prior to 2.6.0
**Description:**
PyTorch, a Python package for tensor computation and deep neural networks, is affected by a Remote Command Execution (RCE) vulnerability. This vulnerability exists when loading a model using the `torch.load()` function with the `weights only=True` parameter. Exploitation of this vulnerability allows attackers to execute arbitrary code on the system.
**Recommendations:**
PyTorch versions prior to 2.6.0 are vulnerable and should be updated to version 2.6.0 or later to address this issue. As an interim measure, avoid using `torch.load()` with the `weights only=True` parameter and implement additional verification of model files.
Fix
RCE
Deserialization of Untrusted Data
Weakness Enumeration
Related Identifiers
Affected Products
References · 55
- https://github.com/pytorch/pytorch/security/advisories/GHSA-53q9-r3pm-6pq6⭐ 90366 🔗 24274 · Vendor Advisory
- https://security-tracker.debian.org/tracker/CVE-2025-32434 · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32434 · Security Note
- https://osv.dev/vulnerability/BIT-pytorch-2025-32434 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-32434 · Security Note
- https://bdu.fstec.ru/vul/2025-04916 · Security Note
- https://security-tracker.debian.org/tracker/source-package/pytorch · Vendor Advisory
- https://osv.dev/vulnerability/PYSEC-2025-41 · Vendor Advisory
- https://osv.dev/vulnerability/CVE-2025-32434 · Vendor Advisory
- https://osv.dev/vulnerability/GHSA-53q9-r3pm-6pq6 · Vendor Advisory
- https://github.com/pytorch/pytorch⭐ 89661 🔗 24058 · Note
- https://github.com/pytorch/pytorch/commit/8d4b8a920a2172523deb95bf20e8e52d50649c04⭐ 89661 🔗 24058 · Note
- https://github.com/pypa/advisory-database/tree/main/vulns/torch/PYSEC-2025-41.yaml⭐ 288 🔗 72 · Note
- https://reddit.com/r/CVEWatch/comments/1k584yg/top_10_trending_cves_22042025 · Reddit Post
- https://twitter.com/CCBalert/status/1914694446576214446 · Twitter Post