Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-2148 | A code injection vulnerability exists in the huggingface/text-generation-inference repository, specifically within the `autodocs.yml` workflow file. The vulnerability arises from the insecure handling of the `github.head_ref` user input, which is used to dynamically construct a command for installing a software package. An attacker can exploit this by forking the repository, creating a branch with a malicious payload as the name, and then opening a pull request to the base repository. Successful exploitation could lead to arbitrary code execution within the context of the GitHub Actions runner. This issue affects versions up to and including v2.0.0 and was fixed in version 2.0.0. |
Github GHSA |
GHSA-qq99-p57r-g3v7 | code injection vulnerability exists in the huggingface/text-generation-inference repository |
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2024-08-01T20:26:57.025Z
Reserved: 2024-04-17T16:09:05.359Z
Link: CVE-2024-3924
Updated: 2024-08-01T20:26:57.025Z
Status : Deferred
Published: 2024-05-30T15:15:49.653
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-3924
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA