GHSA-mcrp-whpw-jp68

Suggest an improvement
Source
https://github.com/advisories/GHSA-mcrp-whpw-jp68
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/03/GHSA-mcrp-whpw-jp68/GHSA-mcrp-whpw-jp68.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-mcrp-whpw-jp68
Aliases
Published
2025-03-21T15:32:15Z
Modified
2025-03-21T15:42:26.728575Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
InvokeAI Deserialization of Untrusted Data vulnerability
Details

A remote code execution vulnerability exists in invoke-ai/invokeai versions 5.3.1 through 5.4.2 via the /api/v2/models/install API. The vulnerability arises from unsafe deserialization of model files using torch.load without proper validation. Attackers can exploit this by embedding malicious code in model files, which is executed upon loading. This issue is fixed in version 5.4.3.

Database specific
{
    "nvd_published_at": "2025-03-20T10:15:26Z",
    "cwe_ids": [
        "CWE-502"
    ],
    "severity": "CRITICAL",
    "github_reviewed": true,
    "github_reviewed_at": "2025-03-21T15:32:15Z"
}
References

Affected packages

PyPI / invokeai

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.3.1
Fixed
5.4.3rc1

Affected versions

5.*

5.3.1
5.4.0
5.4.1rc1
5.4.1rc2
5.4.1
5.4.2rc1
5.4.2