Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. InvokeAI
  4. ›
  5. CVE-2024-12029

CVE-2024-12029: InvokeAI Deserialization of Untrusted Data vulnerability

March 21, 2025

A remote code execution vulnerability exists in invoke-ai/invokeai versions 5.3.1 through 5.4.2 via the /api/v2/models/install API. The vulnerability arises from unsafe deserialization of model files using torch.load without proper validation. Attackers can exploit this by embedding malicious code in model files, which is executed upon loading. This issue is fixed in version 5.4.3.

References

  • github.com/advisories/GHSA-mcrp-whpw-jp68
  • github.com/invoke-ai/InvokeAI
  • github.com/invoke-ai/invokeai/commit/756008dc5899081c5aa51e5bd8f24c1b3975a59e
  • github.com/pypa/advisory-database/tree/main/vulns/invokeai/PYSEC-2025-9.yaml
  • huntr.com/bounties/9b790f94-1b1b-4071-bc27-78445d1a87a3
  • nvd.nist.gov/vuln/detail/CVE-2024-12029

Code Behaviors & Features

Detect and mitigate CVE-2024-12029 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 5.3.1 before 5.4.3rc1

Fixed versions

  • 5.4.3rc1

Solution

Upgrade to version 5.4.3rc1 or above.

Impact 9.8 CRITICAL

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-502: Deserialization of Untrusted Data

Source file

pypi/InvokeAI/CVE-2024-12029.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 00:15:48 +0000.