Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 15 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Insecure Deserialization in optimate's Model Loading Enables Remote Code Execution |
Fri, 15 May 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Tue, 12 May 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Insecure Deserialization in optimate's Model Loading Enables Remote Code Execution | |
| Weaknesses | CWE-502 |
Tue, 12 May 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The _load_model() function in the neural_magic_training.py script of the optimate project in commit a6d302f912b481c94370811af6b11402f51d377f (2024-07-21) is vulnerable to insecure deserialization (CWE-502). When loading a model state dictionary from a state_dict.pt file via torch.load(), the function does not enable the weights_only=True security parameter. This allows the deserialization of arbitrary Python objects through the Pickle module. A remote attacker can exploit this by providing a maliciously crafted state_dict.pt file within a directory specified via the --model argument, leading to arbitrary code execution during the deserialization process on the victim's system. | |
| References |
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-15T14:00:28.092Z
Reserved: 2026-03-09T00:00:00.000Z
Link: CVE-2026-31218
Updated: 2026-05-15T14:00:17.397Z
Status : Deferred
Published: 2026-05-12T16:16:13.710
Modified: 2026-05-15T15:16:50.730
Link: CVE-2026-31218
No data.
OpenCVE Enrichment
Updated: 2026-05-15T16:00:03Z