


Perceptive Security
SOC/SIEM Consultancy

PyTorch is a Python package that provides tensor computation. Prior to version 2.10.0, a vulnerability in PyTorch's `weights_only` unpickler allows an attacker …
Published:
26 januari 2026 om 23:00:00
Alert date:
27 januari 2026 om 23:04:33
Source:
nvd.nist.gov
Supply Chain & Dependencies, Emerging Technologies
A vulnerability in PyTorch's weights_only unpickler allows attackers to craft malicious checkpoint files (.pth) that can corrupt memory and potentially lead to arbitrary code execution when loaded with torch.load(..., weights_only=True). The vulnerability affects PyTorch versions prior to 2.10.0. Attackers can exploit this by creating specially crafted .pth checkpoint files. The issue has been fixed in PyTorch version 2.10.0. This represents a significant security risk for machine learning applications using PyTorch for model loading.
Technical details
Mitigation steps:
Affected products:
PyTorch
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-24747
https://github.com/pytorch/pytorch/163122/commit/954dc5183ee9205cbe79876ad05dd2d9ae752139
https://github.com/pytorch/pytorch/issues/163105
https://github.com/pytorch/pytorch/releases/tag/v2.10.0
https://github.com/pytorch/pytorch/security/advisories/GHSA-63cw-57p8-fm3p
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
