PYSEC-2025-9

See a problem?
Import Source
https://github.com/pypa/advisory-database/blob/main/vulns/invokeai/PYSEC-2025-9.yaml
JSON Data
https://api.osv.dev/v1/vulns/PYSEC-2025-9
Aliases
Published
2025-03-20T10:15:26Z
Modified
2025-03-21T15:42:26.728575Z
Summary
[none]
Details

A remote code execution vulnerability exists in invoke-ai/invokeai versions 5.3.1 through 5.4.2 via the /api/v2/models/install API. The vulnerability arises from unsafe deserialization of model files using torch.load without proper validation. Attackers can exploit this by embedding malicious code in model files, which is executed upon loading. This issue is fixed in version 5.4.3.

References

Affected packages

PyPI / invokeai

Package

Affected ranges

Type
GIT
Repo
https://github.com/invoke-ai/invokeai
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Type
ECOSYSTEM
Events
Introduced
5.3.1
Fixed
5.4.3rc1

Affected versions

5.*

5.3.1
5.4.0
5.4.1rc1
5.4.1rc2
5.4.1
5.4.2rc1
5.4.2