CVE-2025-54886
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-08

Last updated on: 2025-08-08

Assigner: GitHub, Inc.

Description
skops is a Python library which helps users share and ship their scikit-learn based models. In versions 0.12.0 and below, the Card.get_model does not contain any logic to prevent arbitrary code execution. The Card.get_model function supports both joblib and skops for model loading. When loading .skops models, it uses skops' secure loading with trusted type validation, raising errors for untrusted types unless explicitly allowed. However, when non-.zip file formats are provided, the function silently falls back to joblib without warning. Unlike skops, joblib allows arbitrary code execution during loading, bypassing security measures and potentially enabling malicious code execution. This issue is fixed in version 0.13.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-08
Last Modified
2025-08-08
Generated
2026-05-06
AI Q&A
2025-08-08
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
skops skops *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-502 The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The vulnerability exists in the skops Python library versions 0.12.0 and below, specifically in the Card.get_model function. This function is intended to load machine learning models securely using skops' trusted type validation for .skops files. However, when loading models in non-.zip formats, the function silently falls back to using joblib, which does not have these security checks and allows arbitrary code execution. This means an attacker could exploit this fallback to execute malicious code during model loading.


How can this vulnerability impact me? :

This vulnerability can lead to arbitrary code execution on the system where the vulnerable skops library is used. An attacker could craft a malicious model file in a non-.zip format that, when loaded by the vulnerable Card.get_model function, executes harmful code. This could compromise the confidentiality, integrity, and availability of the affected system.


What immediate steps should I take to mitigate this vulnerability?

Upgrade the skops library to version 0.13.0 or later, as this version fixes the vulnerability by properly handling model loading and preventing arbitrary code execution.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart