The huggingface/transformers library is vulnerable to arbitrary code execution through deserialization of untrusted data within the `load_repo_checkpoint()` function of the `TFPreTrainedModel()` class. Attackers can execute arbitrary code and commands by crafting a malicious serialized payload, exploiting the use of `pickle.load()` on data from potentially untrusted sources. This vulnerability allows for remote code execution (RCE) by deceiving victims into loading a seemingly harmless checkpoint during a normal training process, thereby enabling attackers to execute arbitrary code on the targeted machine.
References
| Link | Resource |
|---|---|
| https://github.com/huggingface/transformers/commit/693667b8ac8138b83f8adb6522ddaf42fa07c125 | Patch |
| https://huntr.com/bounties/b3c36992-5264-4d7f-9906-a996efafba8f | Exploit Third Party Advisory |
| https://github.com/huggingface/transformers/commit/693667b8ac8138b83f8adb6522ddaf42fa07c125 | Patch |
| https://huntr.com/bounties/b3c36992-5264-4d7f-9906-a996efafba8f | Exploit Third Party Advisory |
Configurations
History
10 Oct 2025, 17:55
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:huggingface:transformers:*:*:*:*:*:*:*:* | |
| First Time |
Huggingface transformers
Huggingface |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.6 |
| References | () https://github.com/huggingface/transformers/commit/693667b8ac8138b83f8adb6522ddaf42fa07c125 - Patch | |
| References | () https://huntr.com/bounties/b3c36992-5264-4d7f-9906-a996efafba8f - Exploit, Third Party Advisory |
Information
Published : 2024-04-10 17:15
Updated : 2025-10-10 17:55
NVD link : CVE-2024-3568
Mitre link : CVE-2024-3568
CVE.ORG link : CVE-2024-3568
JSON object : View
Products Affected
huggingface
- transformers
CWE
CWE-502
Deserialization of Untrusted Data
