VulnWatch VulnWatch
← Back to dashboard
#

Remote Code Execution

101 entries

Unknown rss_thehackernews

Cohere AI Terrarium Sandbox Flaw Enables Root Code Execution, Container Escape

A critical security vulnerability has been disclosed in a Python-based sandbox called Terrarium that could result in arbitrary code execution. The vulnerability, tracked as CVE-2026-5752, is rated 9.3...

15 hours ago
Unknown rss_thehackernews

SGLang CVE-2026-5760 (CVSS 9.8) Enables RCE via Malicious GGUF Model Files

A critical security vulnerability has been disclosed in SGLang that, if successfully exploited, could result in remote code execution on susceptible systems. The vulnerability, tracked as CVE-2026-576...

2 days ago
Unknown rss_thehackernews

Anthropic MCP Design Vulnerability Enables RCE, Threatening AI Supply Chain

Cybersecurity researchers have discovered a critical "by design" weakness in the Model Context Protocol's (MCP) architecture that could pave the way for remote code execution and have a cascading effe...

2 days ago
Low osv

LangChain has incomplete f-string validation in prompt templates

LangChain's f-string prompt-template validation was incomplete in two respects. First, some prompt template classes accepted f-string templates and formatted them without enforcing the same attribute...

3.1
CVSS
2 weeks ago
Low osv

HuggingFace Transformers allows for arbitrary code execution in the `Trainer` class

A vulnerability in the HuggingFace Transformers library, specifically in the `Trainer` class, allows for arbitrary code execution. The `_load_rng_state()` method in `src/transformers/trainer.py` at li...

3.0
CVSS
2 weeks ago
Low osv

BentoML: SSTI via Unsandboxed Jinja2 in Dockerfile Generation

## Summary The Dockerfile generation function `generate_containerfile()` in `src/bentoml/_internal/container/generate.py` uses an unsandboxed `jinja2.Environment` with the `jinja2.ext.do` extension t...

3.1
CVSS
2 weeks ago
Low osv

BentoML: Command Injection in cloud deployment setup script

Commit ce53491 (March 24) fixed command injection via `system_packages` in Dockerfile templates and `images.py` by adding `shlex.quote`. However, the cloud deployment path in `src/bentoml/_internal/cl...

3.1
CVSS
2 weeks ago
Medium osv

LiteLLM: Privilege escalation via unrestricted proxy configuration endpoint

### Impact The `/config/update endpoint` does not enforce admin role authorization. A user who is already authenticated into the platform can then use this endpoint to do the following: - Modify p...

4.0
CVSS
2 weeks ago
Low osv

mlflow: FastAPI job endpoints under `/ajax-api/3.0/jobs/*` are not protected by authentication or authorization

In mlflow/mlflow, the FastAPI job endpoints under `/ajax-api/3.0/jobs/*` are not protected by authentication or authorization when the `basic-auth` app is enabled. This vulnerability affects the lates...

3.0
CVSS
2 weeks ago
Low osv

MLflow Command Injection vulnerability

A command injection vulnerability exists in MLflow's model serving container initialization code, specifically in the `_install_model_dependencies_to_env()` function. When deploying a model with `env_...

3.0
CVSS
3 weeks ago
Low osv

vLLM has Hardcoded Trust Override in Model Files Enables RCE Despite Explicit User Opt-Out

### Summary Two model implementation files hardcode `trust_remote_code=True` when loading sub-components, bypassing the user's explicit `--trust-remote-code=False` security opt-out. This enables re...

3.1
CVSS
3 weeks ago
Low osv

BentoML has Dockerfile Command Injection via system_packages in bentofile.yaml

## Summary The `docker.system_packages` field in `bentofile.yaml` accepts arbitrary strings that are interpolated directly into Dockerfile `RUN` commands without sanitization. Since `system_packages`...

3.1
CVSS
3 weeks ago
Low osv

Arbitrary file write via tar traversal in mlflow

A vulnerability in MLflow's pyfunc extraction process allows for arbitrary file writes due to improper handling of tar archive entries. Specifically, the use of `tarfile.extractall` without path valid...

3.0
CVSS
1 month ago
Low osv

MLflow has a command injection in mlflow/sagemaker/__init__.py

A command injection vulnerability exists in mlflow/mlflow versions before v3.7.0, specifically in the `mlflow/sagemaker/__init__.py` file at lines 161-167. The vulnerability arises from the direct int...

3.0
CVSS
1 month ago
Medium osv

BentoML Vulnerable to Arbitrary File Write via Symlink Path Traversal in Tar Extraction

# Arbitrary File Write via Symlink Path Traversal in Tar Extraction ## Summary The `safe_extract_tarfile()` function validates that each tar member's path is within the destination directory, but fo...

4.0
CVSS
1 month ago
Low osv

MLflow Tracking Server Artifact Handler Directory Traversal Remote Code Execution Vulnerability

MLflow Tracking Server Artifact Handler Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of MLflo...

3.0
CVSS
2 months ago
Low osv

vLLM has RCE In Video Processing

## Summary **A chain of vulnerabilities in vLLM allow Remote Code Execution (RCE):** 1. **Info Leak** - PIL error messages expose memory addresses, bypassing ASLR 2. **Heap Overflow** - JPEG2000 dec...

3.1
CVSS
2 months ago
Low osv

mlflow Creates of Temporary File in Directory with Insecure Permissions

In mlflow version 2.20.3, the temporary directory used for creating Python virtual environments is assigned insecure world-writable permissions (0o777). This vulnerability allows an attacker with writ...

3.0
CVSS
2 months ago
Low osv

vLLM affected by RCE via auto_map dynamic module loading during model initialization

# Summary vLLM loads Hugging Face `auto_map` dynamic modules during model resolution **without gating on `trust_remote_code`**, allowing attacker-controlled Python code in a model repo/path to execut...

3.1
CVSS
3 months ago
Low osv

LangChain serialization injection vulnerability enables secret extraction

## Context A serialization injection vulnerability exists in LangChain JS's `toJSON()` method (and subsequently when string-ifying objects using `JSON.stringify()`. The method did not escape objects...

3.1
CVSS
3 months ago
Low osv

LangChain serialization injection vulnerability enables secret extraction in dumps/loads APIs

## Summary A serialization injection vulnerability exists in LangChain's `dumps()` and `dumpd()` functions. The functions do not escape dictionaries with `'lc'` keys when serializing free-form dictio...

3.1
CVSS
3 months ago
Low osv

vLLM vulnerable to remote code execution via transformers_utils/get_config

### Summary `vllm` has a critical remote code execution vector in a config class named `Nemotron_Nano_VL_Config`. When `vllm` loads a model config that contains an `auto_map` entry, the config class...

3.1
CVSS
4 months ago
Low osv

vLLM deserialization vulnerability leading to DoS and potential RCE

### Summary A memory corruption vulnerability that leading to a crash (denial-of-service) and potentially remote code execution (RCE) exists in vLLM versions 0.10.2 and later, in the Completions API e...

3.1
CVSS
5 months ago
Low osv

MLflow Tracking Server Model Creation Directory Traversal Remote Code Execution Vulnerability

MLflow Tracking Server Model Creation Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of MLflow...

3.0
CVSS
5 months ago
Low osv

vLLM has remote code execution vulnerability in the tool call parser for Qwen3-Coder

### Summary An unsafe deserialization vulnerability allows any authenticated user to execute arbitrary code on the server if they are able to get the model to pass the code as an argument to a tool ca...

3.1
CVSS
8 months ago