CVE-2025-46567: LLaMA-Factory Allows Arbitrary Code Execution via Unsafe Deserialization in Ilamafy_baichuan2.py
(updated )
A critical vulnerability exists in the llamafy_baichuan2.py
script of the LLaMA-Factory project. The script performs insecure deserialization using torch.load()
on user-supplied .bin
files from an input directory. An attacker can exploit this behavior by crafting a malicious .bin
file that executes arbitrary commands during deserialization.
References
- github.com/advisories/GHSA-f2f7-gj54-6vpv
- github.com/hiyouga/LLaMA-Factory
- github.com/hiyouga/LLaMA-Factory/blob/main/scripts/convert_ckpt/llamafy_baichuan2.py
- github.com/hiyouga/LLaMA-Factory/commit/2989d39239d2f46e584c1e1180ba46b9768afb2a
- github.com/hiyouga/LLaMA-Factory/security/advisories/GHSA-f2f7-gj54-6vpv
- nvd.nist.gov/vuln/detail/CVE-2025-46567
Code Behaviors & Features
Detect and mitigate CVE-2025-46567 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →