Description
A remote code execution vulnerability exists in invoke-ai/invokeai versions 5.3.1 through 5.4.2 via the /api/v2/models/install API. The vulnerability arises from unsafe deserialization of model files using torch.load without proper validation. Attackers can exploit this by embedding malicious code in model files, which is executed upon loading. This issue is fixed in version 5.4.3.
Published: 2025-03-20
Score: 9.8 Critical
EPSS: 49.1% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-mcrp-whpw-jp68 InvokeAI Deserialization of Untrusted Data vulnerability
History

Thu, 20 Mar 2025 10:15:00 +0000

Type Values Removed Values Added
Description A remote code execution vulnerability exists in invoke-ai/invokeai versions 5.3.1 through 5.4.2 via the /api/v2/models/install API. The vulnerability arises from unsafe deserialization of model files using torch.load without proper validation. Attackers can exploit this by embedding malicious code in model files, which is executed upon loading. This issue is fixed in version 5.4.3.
Title Remote Code Execution via Model Deserialization in invoke-ai/invokeai
Weaknesses CWE-502
References
Metrics cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published:

Updated: 2025-03-20T14:33:03.024Z

Reserved: 2024-12-02T15:06:57.890Z

Link: CVE-2024-12029

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-03-20T10:15:26.157

Modified: 2025-03-20T15:15:40.423

Link: CVE-2024-12029

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses