Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. ms-swift
  4. ›
  5. CVE-2025-41419

CVE-2025-41419: MS SWIFT WEB-UI RCE Vulnerability

July 31, 2025 (updated October 23, 2025)

I. Detailed Description:

This includes scenarios, screenshots, vulnerability reproduction methods. For account-related vulnerabilities, please provide test accounts. If the reproduction process is complex, you may record a video, upload it to Taopan, and attach the link.

  1. Install ms-swift
pip install ms-swift -U
  1. Start web-ui
swift web-ui --lang en
  1. After startup, access through browser at http://localhost:7860/ to see the launched fine-tuning framework program

  2. Fill in necessary parameters In the LLM Training interface, fill in required parameters including Model id, Dataset Code. The –output_dir can be filled arbitrarily as it will be modified later through packet capture

  3. Click Begin to start training. Capture packets and modify the parameter corresponding to –output_dir

You can see the concatenated command being executed in the terminal where web-ui was started

  1. Wait for the program to run (testing shows it requires at least 5 minutes), and you can observe the effect of command execution creating files

II. Vulnerability Proof (Write POC here):

/tmp/xxx'; touch /tmp/inject_success_1; #

III. Fix Solution:

  1. The swift.ui.llm_train.llm_train.LLMTrain#train() method should not directly concatenate parameters with commands after receiving commands from the frontend
  2. The swift.ui.llm_train.llm_train.LLMTrain#train_local() method should not use os.system for execution, but should be changed to subprocess.run([cmd, arg1, arg2…]) format

References

  • github.com/advisories/GHSA-7c78-rm87-5673
  • github.com/modelscope/ms-swift
  • github.com/modelscope/ms-swift/commit/32f09e9b0a44f19d44210e2b5b47c58ab01740e1
  • github.com/modelscope/ms-swift/security/advisories/GHSA-7c78-rm87-5673
  • nvd.nist.gov/vuln/detail/CVE-2025-41419

Code Behaviors & Features

Detect and mitigate CVE-2025-41419 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 3.7.0

Fixed versions

  • 3.7.0

Solution

Upgrade to version 3.7.0 or above.

Weakness

  • CWE-117: Improper Output Neutralization for Logs

Source file

pypi/ms-swift/CVE-2025-41419.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Mon, 03 Nov 2025 12:19:45 +0000.