- Description
- LLama Factory enables fine-tuning of large language models. Prior to version 1.0.0, a critical vulnerability exists in the `llamafy_baichuan2.py` script of the LLaMA-Factory project. The script performs insecure deserialization using `torch.load()` on user-supplied `.bin` files from an input directory. An attacker can exploit this behavior by crafting a malicious `.bin` file that executes arbitrary commands during deserialization. This issue has been patched in version 1.0.0.
- Source
- security-advisories@github.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
- security-advisories@github.com
- CWE-502
- Hype score
- Not currently trending
CVE-2025-46567 Arbitrary Code Execution via Insecure Deserialization in LLaMA-Factory Before 1.0.0 https://t.co/Ujd3ENOaxc
@VulmonFeeds
2 May 2025
14 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-46567 LLama Factory enables fine-tuning of large language models. Prior to version 1.0.0, a critical vulnerability exists in the `llamafy_baichuan2.py` script of the LLaMA-… https://t.co/rP65nz6zEY
@CVEnew
1 May 2025
45 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hiyouga:llama-factory:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "CCE62620-4488-49A9-BA7B-C8E2790768AC",
"versionEndExcluding": "1.0.0"
}
],
"operator": "OR"
}
]
}
]