Description
A remote code execution vulnerability exists in invoke-ai/invokeai versions 5.3.1 through 5.4.2 via the /api/v2/models/install API. The vulnerability arises from unsafe deserialization of model files using torch.load without proper validation. Attackers can exploit this by embedding malicious code in model files, which is executed upon loading. This issue is fixed in version 5.4.3.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-mcrp-whpw-jp68 | InvokeAI Deserialization of Untrusted Data vulnerability |
References
History
Thu, 20 Mar 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A remote code execution vulnerability exists in invoke-ai/invokeai versions 5.3.1 through 5.4.2 via the /api/v2/models/install API. The vulnerability arises from unsafe deserialization of model files using torch.load without proper validation. Attackers can exploit this by embedding malicious code in model files, which is executed upon loading. This issue is fixed in version 5.4.3. | |
| Title | Remote Code Execution via Model Deserialization in invoke-ai/invokeai | |
| Weaknesses | CWE-502 | |
| References |
| |
| Metrics |
cvssV3_0
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2025-03-20T14:33:03.024Z
Reserved: 2024-12-02T15:06:57.890Z
Link: CVE-2024-12029
No data.
Status : Awaiting Analysis
Published: 2025-03-20T10:15:26.157
Modified: 2025-03-20T15:15:40.423
Link: CVE-2024-12029
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA