CVE-2025-14930
Deserialization RCE in Hugging Face Transformers GLM4 Weights Parsing
Publication date: 2025-12-23
Last updated on: 2025-12-23
Assigner: Zero Day Initiative
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| hugging_face | transformers | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-502 | The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a remote code execution flaw in the Hugging Face Transformers library, specifically in the GLM4 model's deserialization process. It occurs because the software does not properly validate user-supplied data when parsing model weights, allowing an attacker to deserialize untrusted data. Exploiting this requires user interaction, such as visiting a malicious webpage or opening a malicious file, and enables the attacker to execute arbitrary code within the current process. [1]
How can this vulnerability impact me? :
If exploited, this vulnerability allows an attacker to execute arbitrary code on your system within the context of the affected process. This can lead to full compromise of confidentiality, integrity, and availability of the system or data handled by the Hugging Face Transformers library. Since exploitation requires user interaction, the risk involves users opening malicious files or visiting malicious websites, potentially leading to unauthorized control or damage. [1]
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, avoid opening untrusted files or visiting untrusted webpages that may trigger the deserialization of malicious data in the Hugging Face Transformers GLM4 model. Additionally, ensure that your installation of the Hugging Face Transformers library is updated with any patches or fixes provided by the vendor addressing this vulnerability. [1]