top of page
perceptive_background_267k.jpg

PyTorch is a Python package that provides tensor computation. Prior to version 2.10.0, a vulnerability in PyTorch's `weights_only` unpickler allows an attacker …

Published:

26 January 2026 at 23:00:00

Alert date:

27 January 2026 at 23:04:33

Source:

nvd.nist.gov

Click to open the original link from this advisory

Supply Chain & Dependencies, Emerging Technologies

A vulnerability in PyTorch's weights_only unpickler allows attackers to craft malicious checkpoint files (.pth) that can corrupt memory and potentially lead to arbitrary code execution when loaded with torch.load(..., weights_only=True). The vulnerability affects PyTorch versions prior to 2.10.0. Attackers can exploit this by creating specially crafted .pth checkpoint files. The issue has been fixed in PyTorch version 2.10.0. This represents a significant security risk for machine learning applications using PyTorch for model loading.

Technical details

Mitigation steps:

Affected products:

PyTorch

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page