torch is vulnerable to Remote Code Execution (RCE)
85
High Risk
By default, affected versions of this package handle unpickling with weights_only=False, which relies on Python's insecure pickle module, allowing the execution of arbitrary code embedded in malicious pickle files. Attackers can exploit this flaw for remote code execution (RCE). The current patched version fixes it by setting weights_only=True by default, which mitigates the risk by restricting unpickling to safe tensor classes.
You are affected if you are using a version that falls within the vulnerable range.
torch is vulnerable to Remote Code Execution (RCE) in versions 1.0.0 - 2.5.1.
Upgrade the torch library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant