Intel

AIKIDO-2025-10060

torch is vulnerable to Remote Code Execution (RCE)

Remote Code Execution (RCE)CVE-2025-32434

85

High Risk

This Affects:

Pythontorch
1.0.0 - 2.5.1
Fixed in 2.6.0

TL;DR

By default, affected versions of this package handle unpickling with weights_only=False, which relies on Python's insecure pickle module, allowing the execution of arbitrary code embedded in malicious pickle files. Attackers can exploit this flaw for remote code execution (RCE). The current patched version fixes it by setting weights_only=True by default, which mitigates the risk by restricting unpickling to safe tensor classes.

Who does this affect?

You are affected if you are using a version that falls within the vulnerable range.

Background info

torch is vulnerable to Remote Code Execution (RCE) in versions 1.0.0 - 2.5.1.

How to fix this

Upgrade the torch library to the patch version.