PT-2026-30793 · Hugging Face · Huggingface/Transformers

Published

2026-04-07

·

Updated

2026-04-07

·

CVE-2026-1839

CVSS v3.1

6.5

Medium

AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:H
A vulnerability in the HuggingFace Transformers library, specifically in the Trainer class, allows for arbitrary code execution. The load rng state() method in src/transformers/trainer.py at line 3059 calls torch.load() without the weights only=True parameter. This issue affects all versions of the library supporting torch>=2.2 when used with PyTorch versions below 2.6, as the safe globals() context manager provides no protection in these versions. An attacker can exploit this vulnerability by supplying a malicious checkpoint file, such as rng state.pth, which can execute arbitrary code when loaded. The issue is resolved in version v5.0.0rc3.

Fix

Deserialization of Untrusted Data

Weakness Enumeration

Related Identifiers

CVE-2026-1839

Affected Products

Huggingface/Transformers