CVE-2025-50472 (CNNVD-202508-051)

CRITICAL
中文标题:
SWIFT 安全漏洞
英文标题:
The modelscope/ms-swift library thru 2.6.1 is vulnerable to arbitrary code execution through deseria...
CVSS分数: 9.8
发布时间: 2025-08-01 00:00:00
漏洞类型: 其他
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

SWIFT是ModelScope开源的一个大模型与多模态大模型微调部署框架。 SWIFT 2.6.1及之前版本存在安全漏洞,该漏洞源于ModelFileSystemCache类中load_model_meta()函数对不可信数据反序列化,可能导致任意代码执行。

英文描述:

The modelscope/ms-swift library thru 2.6.1 is vulnerable to arbitrary code execution through deserialization of untrusted data within the `load_model_meta()` function of the `ModelFileSystemCache()` class. Attackers can execute arbitrary code and commands by crafting a malicious serialized `.mdl` payload, exploiting the use of `pickle.load()` on data from potentially untrusted sources. This vulnerability allows for remote code execution (RCE) by deceiving victims into loading a seemingly harmless checkpoint during a normal training process, thereby enabling attackers to execute arbitrary code on the targeted machine. Note that the payload file is a hidden file, making it difficult for the victim to detect tampering. More importantly, during the model training process, after the `.mdl` file is loaded and executes arbitrary code, the normal training process remains unaffected'meaning the user remains unaware of the arbitrary code execution.

CWE类型:
CWE-502
标签:
(暂无数据)
受影响产品
暂无受影响产品信息
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
CVSS评分详情
3.1 (adp)
CRITICAL
9.8
CVSS向量: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
机密性
HIGH
完整性
HIGH
可用性
HIGH
时间信息
发布时间:
2025-08-01 00:00:00
修改时间:
2025-08-01 17:17:49
创建时间:
2025-11-11 15:40:38
更新时间:
2025-11-11 16:00:04
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2025-50472 2025-11-11 15:23:26 2025-11-11 07:40:38
NVD nvd_CVE-2025-50472 2025-11-11 15:00:58 2025-11-11 07:48:26
CNNVD cnnvd_CNNVD-202508-051 2025-11-11 15:12:52 2025-11-11 08:00:04
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 16:00:04
vulnerability_type: 未提取 → 其他; cnnvd_id: 未提取 → CNNVD-202508-051; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 其他
  • cnnvd_id: 未提取 -> CNNVD-202508-051
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:48:26
data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • data_sources: ['cve'] -> ['cve', 'nvd']