CVE-2024-12029: InvokeAI Deserialization of Untrusted Data vulnerability
A remote code execution vulnerability exists in invoke-ai/invokeai versions 5.3.1 through 5.4.2 via the /api/v2/models/install API. The vulnerability arises from unsafe deserialization of model files using torch.load without proper validation. Attackers can exploit this by embedding malicious code in model files, which is executed upon loading. This issue is fixed in version 5.4.3.
References
- github.com/advisories/GHSA-mcrp-whpw-jp68
- github.com/invoke-ai/InvokeAI
- github.com/invoke-ai/invokeai/commit/756008dc5899081c5aa51e5bd8f24c1b3975a59e
- github.com/pypa/advisory-database/tree/main/vulns/invokeai/PYSEC-2025-9.yaml
- huntr.com/bounties/9b790f94-1b1b-4071-bc27-78445d1a87a3
- nvd.nist.gov/vuln/detail/CVE-2024-12029
Code Behaviors & Features
Detect and mitigate CVE-2024-12029 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →