LLama Factory enables fine-tuning of large language models. A critical remote OS command injection vulnerability has been identified in the LLama Factory training process. This vulnerability arises from improper handling of user input, allowing malicious actors to execute arbitrary OS commands on the host system. The issue is caused by insecure usage of the `Popen` function with `shell=True`, coupled with unsanitized user input. Immediate remediation is required to mitigate the risk. This vulnerability is fixed in 0.9.1.
References
Configurations
History
27 Aug 2025, 16:42
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:hiyouga:llama-factory:*:*:*:*:*:*:*:* | |
CWE | CWE-78 | |
First Time |
Hiyouga llama-factory
Hiyouga |
|
References | () https://gist.github.com/superboy-zjc/f2d2b93ae511c445ba97e144b70e534d - Exploit | |
References | () https://github.com/hiyouga/LLaMA-Factory/commit/b3aa80d54a67da45e9e237e349486fb9c162b2ac - Patch | |
References | () https://github.com/hiyouga/LLaMA-Factory/security/advisories/GHSA-hj3w-wrh4-44vp - Exploit, Vendor Advisory |
Information
Published : 2024-11-21 17:15
Updated : 2025-08-27 16:42
NVD link : CVE-2024-52803
Mitre link : CVE-2024-52803
CVE.ORG link : CVE-2024-52803
JSON object : View
Products Affected
hiyouga
- llama-factory