Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 07 Jan 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mthreads
Mthreads torch Musa |
|
| CPEs | cpe:2.3:a:mthreads:torch_musa:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Mthreads
Mthreads torch Musa |
Mon, 15 Dec 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-502 | |
| Metrics |
cvssV3_1
|
Mon, 15 Dec 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | MooreThreads torch_musa through all versions contains an unsafe deserialization vulnerability in torch_musa.utils.compare_tool. The compare_for_single_op() and nan_inf_track_for_single_op() functions use pickle.load() on user-controlled file paths without validation, allowing arbitrary code execution. An attacker can craft a malicious pickle file that executes arbitrary Python code when loaded, enabling remote code execution with the privileges of the victim process. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-12-15T18:59:48.940Z
Reserved: 2025-11-18T00:00:00.000Z
Link: CVE-2025-65213
Updated: 2025-12-15T18:58:43.885Z
Status : Analyzed
Published: 2025-12-15T19:16:05.207
Modified: 2026-01-07T20:51:19.160
Link: CVE-2025-65213
No data.
OpenCVE Enrichment
No data.