Metrics
Affected Vendors & Products
Fri, 15 May 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Insecure Deserialization in PyTorch-Lightning Leads to Remote Code Execution |
Fri, 15 May 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
ssvc
|
Thu, 14 May 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Insecure Deserialization in PyTorch-Lightning Allows Arbitrary Code Execution |
Thu, 14 May 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-502 | |
| CPEs | cpe:2.3:a:lightningai:pytorch_lightning:*:*:*:*:*:python:*:* | |
| Metrics |
cvssV3_1
|
Tue, 12 May 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Lightningai
Lightningai pytorch Lightning |
|
| Vendors & Products |
Lightningai
Lightningai pytorch Lightning |
Tue, 12 May 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Insecure Deserialization in PyTorch-Lightning Allows Arbitrary Code Execution |
Tue, 12 May 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PyTorch-Lightning versions 2.6.0 and earlier contain an insecure deserialization vulnerability (CWE-502) in the checkpoint loading mechanism. The LightningModule.load_from_checkpoint() method, which is commonly used to load saved model states, internally calls torch.load() without setting the security-restrictive weights_only=True parameter. This default behavior allows the deserialization of arbitrary Python objects via the Pickle module. A remote attacker can exploit this by providing a maliciously crafted checkpoint file, leading to arbitrary code execution on the victim's system when the file is loaded. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-15T18:05:39.679Z
Reserved: 2026-03-09T00:00:00.000Z
Link: CVE-2026-31221
Updated: 2026-05-15T18:02:42.483Z
Status : Modified
Published: 2026-05-12T16:16:14.020
Modified: 2026-05-15T19:16:57.333
Link: CVE-2026-31221
No data.