Intel

AIKIDO-2025-10888

ultralytics is vulnerable to Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')

Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') Pre-CVE
Found by Aikido Intel before public disclosure or CVE publication.

60

Medium Risk

This Affects:

PYTHONultralytics
8.0.141 - 8.3.233
Fixed in 8.3.234

TL;DR

Affected versions of this package are vulnerable to arbitrary code execution due to the unsafe use of eval() for parsing user-supplied values. This has been fixed by replacing eval() with ast.literal_eval() throughout the codebase, ensuring safe and predictable parsing of configuration inputs. The update prevents code injection risks, improves input handling in functions like smart_value(), and enhances overall security and reliability.

Who does this affect?

You are affected if you are using a version that falls within the vulnerable range.

Background info

ultralytics is vulnerable to Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in versions 8.0.141 - 8.3.233.

How to fix this

Upgrade the ultralytics library to the patch version.