CVE-2025-53002

LLaMA-Factory is a tuning library for large language models. A remote code execution vulnerability was discovered in LLaMA-Factory versions up to and including 0.9.3 during the LLaMA-Factory training process. This vulnerability arises because the `vhead_file` is loaded without proper safeguards, allowing malicious attackers to execute arbitrary malicious code on the host system simply by passing a malicious `Checkpoint path` parameter through the `WebUI` interface. The attack is stealthy, as the victim remains unaware of the exploitation. The root cause is that the `vhead_file` argument is loaded without the secure parameter `weights_only=True`. Version 0.9.4 contains a fix for the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:hiyouga:llama-factory:*:*:*:*:*:*:*:*

History

02 Sep 2025, 17:49

Type Values Removed Values Added
First Time Hiyouga llama-factory
Hiyouga
CPE cpe:2.3:a:hiyouga:llama-factory:*:*:*:*:*:*:*:*
References () https://drive.google.com/file/d/1AddKm2mllsXfuvL4Tvbn_WJdjEOYXx4y/view?usp=sharing - () https://drive.google.com/file/d/1AddKm2mllsXfuvL4Tvbn_WJdjEOYXx4y/view?usp=sharing - Exploit
References () https://github.com/hiyouga/LLaMA-Factory/commit/bb7bf51554d4ba8432333c35a5e3b52705955ede - () https://github.com/hiyouga/LLaMA-Factory/commit/bb7bf51554d4ba8432333c35a5e3b52705955ede - Patch
References () https://github.com/hiyouga/LLaMA-Factory/security/advisories/GHSA-xj56-p8mm-qmxj - () https://github.com/hiyouga/LLaMA-Factory/security/advisories/GHSA-xj56-p8mm-qmxj - Third Party Advisory, Exploit
Summary
  • (es) LLaMA-Factory es una librería de optimización para modelos de lenguaje grandes. Se descubrió una vulnerabilidad de ejecución remota de código en versiones de LLaMA-Factory hasta la 0.9.3 (incluida) durante su entrenamiento. Esta vulnerabilidad surge porque el `vhead_file` se carga sin las protecciones adecuadas, lo que permite a atacantes maliciosos ejecutar código malicioso arbitrario en el sistema host simplemente pasando el parámetro `Checkpoint path` malicioso a través de la interfaz `WebUI`. El ataque es sigiloso, ya que la víctima desconoce la explotación. La causa principal es que el argumento `vhead_file` se carga sin el parámetro seguro `weights_only=True`. La versión 0.9.4 contiene una solución para este problema.

26 Jun 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-26 15:15

Updated : 2025-09-02 17:49


NVD link : CVE-2025-53002

Mitre link : CVE-2025-53002

CVE.ORG link : CVE-2025-53002


JSON object : View

Products Affected

hiyouga

  • llama-factory
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')

CWE-502

Deserialization of Untrusted Data