PT-2025-33045 · Nvidia · Nvidia Merlin Transformers4Rec
Published
2025-08-13
·
Updated
2025-09-26
·
CVE-2025-23298
7.8
High
Base vector | Vector | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
**Name of the Vulnerable Software and Affected Versions**
NVIDIA Merlin Transformers4Rec (affected versions not specified)
**Description**
NVIDIA Merlin Transformers4Rec contains a vulnerability in a Python dependency that could allow an attacker to cause a code injection issue. Successful exploitation of this issue may lead to code execution, escalation of privileges, information disclosure, and data tampering. The issue is related to the `load model trainer states from checkpoint` function, which uses `torch.load()` from PyTorch without security parameters. `torch.load()` utilizes the Python `pickle` module, which is known to be unsafe when processing untrusted data. The `pickle` module allows the serialization and deserialization of arbitrary Python objects, including those that can execute code during deserialization. An attacker can create a malicious checkpoint file that executes arbitrary commands when loaded. The exploit uses the ` reduce ` method from `pickle` to execute system commands. The vulnerability was addressed in commit b7eaea5, which modified the way checkpoint files are loaded and added additional validation of serialized Python objects. The library now implements a serialization mechanism through `serialization.py`, which restricts deserialization to approved classes and uses a safe loading function with type checking.
**Recommendations**
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
RCE
Code Injection
Weakness Enumeration
Related Identifiers
Affected Products
References · 18
- https://nvd.nist.gov/vuln/detail/CVE-2025-23298 · Security Note
- https://cve.org/CVERecord?id=CVE-2025-23298 · Security Note
- https://zerodayinitiative.com/advisories/ZDI-25-833 · Security Note
- https://t.me/CyberSecurityTechnologies/12391 · Telegram Post
- https://reddit.com/r/Trendmicro/comments/1nr6a8b/cve202523298_rce_via_unsafe_torchload_in_nvidia · Reddit Post
- https://twitter.com/gothburz/status/1955734395937001620 · Twitter Post
- https://reddit.com/r/SecOpsDaily/comments/1npj9g4/secopsdaily_20250924_roundup · Reddit Post
- https://twitter.com/TheZDIBugs/status/1957539178461221105 · Twitter Post
- https://twitter.com/f1tym1/status/1970908501498048596 · Twitter Post
- https://t.me/poxek/5544 · Telegram Post
- https://reddit.com/r/SecOpsDaily/comments/1nphowy/cve202523298_getting_remote_code_execution_in · Reddit Post
- https://twitter.com/CVEnew/status/1955686446104268835 · Twitter Post
- https://t.me/purp_sec/1150 · Telegram Post
- https://twitter.com/dailytechonx/status/1971348993423610079 · Twitter Post
- https://twitter.com/thezdi/status/1970892995101671452 · Twitter Post