/ data / vuln_en / vllm / CVE-2025-24357.yaml
CVE-2025-24357.yaml
 1  info:
 2    name: vllm
 3    cve: CVE-2025-24357
 4    summary: Malicious model remote code execution fix bypass with PyTorch < 2.6.0
 5    details: |
 6      Loading a malicious model could result in code execution on the vllm host. The fix applied to specify `weights_only=True` to calls to `torch.load()` did not solve the problem prior to PyTorch 2.6.0.
 7      This means that versions of vLLM using PyTorch before 2.6.0 are vulnerable to this problem.
 8    cvss: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
 9    severity: CRITICAL
10    security_advise: |
11      1. Upgrade to PyTorch version 2.6.0 or higher.
12      2. Ensure that all installations of vLLM use a secure version of PyTorch as specified in the official documentation.
13  rule: version < "0.8.0"
14  references:
15    - https://github.com/pytorch/pytorch/security/advisories/GHSA-53q9-r3pm-6pq6
16    - https://github.com/vllm-project/vllm/security/advisories/GHSA-ggpf-24jw-3fcw
17    - https://github.com/vllm-project/vllm/security/advisories/GHSA-rh4j-5rhw-hr54
18    - https://github.com/vllm-project/vllm