Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-9pf3-7rrr-x5jh | lmdeploy vulnerable to Arbitrary Code Execution via Insecure Deserialization in torch.load() |
Wed, 31 Dec 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:internlm:lmdeploy:*:*:*:*:*:*:*:* |
Mon, 29 Dec 2025 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Internlm
Internlm lmdeploy |
|
| Vendors & Products |
Internlm
Internlm lmdeploy |
Fri, 26 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 26 Dec 2025 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | LMDeploy is a toolkit for compressing, deploying, and serving LLMs. Prior to version 0.11.1, an insecure deserialization vulnerability exists in lmdeploy where torch.load() is called without the weights_only=True parameter when loading model checkpoint files. This allows an attacker to execute arbitrary code on the victim's machine when they load a malicious .bin or .pt model file. This issue has been patched in version 0.11.1. | |
| Title | lmdeploy vulnerable to Arbitrary Code Execution via Insecure Deserialization in torch.load() | |
| Weaknesses | CWE-502 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-12-26T22:10:54.833Z
Reserved: 2025-12-10T20:04:28.290Z
Link: CVE-2025-67729
Updated: 2025-12-26T22:00:26.782Z
Status : Analyzed
Published: 2025-12-26T22:15:52.437
Modified: 2025-12-31T21:31:22.363
Link: CVE-2025-67729
No data.
OpenCVE Enrichment
Updated: 2025-12-29T22:33:31Z
Github GHSA