Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 14 May 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Insecure Deserialization in Ludwig Framework Allows Remote Code Execution via Predict Method |
Thu, 14 May 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Wed, 13 May 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ludwig-ai
Ludwig-ai ludwig |
|
| Vendors & Products |
Ludwig-ai
Ludwig-ai ludwig |
Tue, 12 May 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Insecure Deserialization in Ludwig Framework Allows Remote Code Execution via Predict Method | |
| Weaknesses | CWE-502 |
Tue, 12 May 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Ludwig framework thru 0.10.4 is vulnerable to insecure deserialization (CWE-502) through its predict() method. When a user provides a dataset file path to the predict() method, the framework automatically determines the file format. If the file is a pickle (.pkl) file, it is loaded using pandas.read_pickle() without any validation or security restrictions. This allows the deserialization of arbitrary Python objects via the unsafe pickle module. A remote attacker can exploit this by providing a maliciously crafted pickle file, leading to arbitrary code execution on the system running the Ludwig prediction. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-14T19:54:23.672Z
Reserved: 2026-03-09T00:00:00.000Z
Link: CVE-2026-31237
No data.
Status : Deferred
Published: 2026-05-12T18:16:52.087
Modified: 2026-05-14T20:17:03.267
Link: CVE-2026-31237
No data.
OpenCVE Enrichment
Updated: 2026-05-14T22:00:10Z