CVE-2025-3777
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-07

Last updated on: 2025-08-07

Assigner: huntr.dev

Description
Hugging Face Transformers versions up to 4.49.0 are affected by an improper input validation vulnerability in the `image_utils.py` file. The vulnerability arises from insecure URL validation using the `startswith()` method, which can be bypassed through URL username injection. This allows attackers to craft URLs that appear to be from YouTube but resolve to malicious domains, potentially leading to phishing attacks, malware distribution, or data exfiltration. The issue is fixed in version 4.52.1.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-07
Last Modified
2025-08-07
Generated
2026-05-07
AI Q&A
2025-07-07
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
huggingface transformers to 4.52.1 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-20 The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
CWE-NVD-CWE-noinfo
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in Hugging Face Transformers up to version 4.49.0 is due to improper input validation in the image_utils.py file. Specifically, the code uses the startswith() method for URL validation, which can be bypassed by attackers through URL username injection. This means attackers can craft URLs that look like they come from YouTube but actually point to malicious domains, potentially enabling phishing attacks, malware distribution, or data exfiltration.


How can this vulnerability impact me? :

The vulnerability can allow attackers to trick the system into accepting malicious URLs disguised as legitimate YouTube links. This can lead to phishing attacks where users are deceived into revealing sensitive information, distribution of malware through these malicious URLs, or unauthorized data exfiltration from affected systems.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves improper URL validation in the Hugging Face Transformers library's image_utils.py file, specifically allowing URL username injection to bypass startswith() checks. To detect exploitation attempts on your system or network, you can monitor logs or network traffic for suspicious URLs that appear to be from YouTube but contain unusual username parts or redirect to unexpected domains. For example, you can use commands like: 1) Using grep to find suspicious URLs in logs: grep -Eo 'https?://[^ ]+' /path/to/logfile | grep '@' 2) Using network monitoring tools like tcpdump or Wireshark to filter HTTP/HTTPS requests containing '@' in URLs, which may indicate username injection. However, no specific detection commands are provided in the resources.


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade the Hugging Face Transformers library to version 4.52.1 or later, where the vulnerability has been fixed. This update addresses the improper input validation in image_utils.py that allowed URL username injection. Additionally, reviewing and restricting the use of untrusted URLs in your application and implementing additional URL validation or sanitization can help reduce risk.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart