Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. ms-swift
  4. ›
  5. CVE-2025-50460

CVE-2025-50460: MS SWIFT Remote Code Execution via unsafe PyYAML deserialization

July 31, 2025 (updated August 1, 2025)

A Remote Code Execution (RCE) vulnerability exists in the modelscope/ms-swift project due to unsafe use of yaml.load() in combination with vulnerable versions of the PyYAML library (≤ 5.3.1). The issue resides in the tests/run.py script, where a user-supplied YAML configuration file is deserialized using yaml.load() with yaml.FullLoader.

If an attacker can control or replace the YAML configuration file provided to the --run_config argument, they may inject a malicious payload that results in arbitrary code execution.

References

  • github.com/Anchor0221/CVE-2025-50460
  • github.com/advisories/GHSA-6757-jp84-gxfx
  • github.com/advisories/GHSA-fm6c-f59h-7mmg
  • github.com/modelscope/ms-swift
  • github.com/modelscope/ms-swift/blob/main/tests/run.py
  • github.com/modelscope/ms-swift/commit/b3418ed9b050dc079553c275c5ed14cfb2b66cf7
  • github.com/modelscope/ms-swift/pull/5174
  • github.com/modelscope/ms-swift/security/advisories/GHSA-fm6c-f59h-7mmg
  • nvd.nist.gov/vuln/detail/CVE-2025-50460

Code Behaviors & Features

Detect and mitigate CVE-2025-50460 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 3.6.3

Solution

Unfortunately, there is no solution available yet.

Impact 9.8 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-502: Deserialization of Untrusted Data

Source file

pypi/ms-swift/CVE-2025-50460.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 19 Aug 2025 12:18:59 +0000.