A remote code execution (RCE) vulnerability exists in the ms-swift project version 3.3.0 due to unsafe deserialization in tests/run.py using yaml.load() from the PyYAML library (versions = 5.3.1). If an attacker can control the content of the YAML configuration file passed to the --run_config parameter, arbitrary code can be executed during deserialization. This can lead to full system compromise. The vulnerability is triggered when a malicious YAML file is loaded, allowing the execution of arbitrary Python commands such as os.system(). It is recommended to upgrade PyYAML to version 5.4 or higher, and to use yaml.safe_load() to mitigate the issue.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-23369 MS SWIFT Remote Code Execution via unsafe PyYAML deserialization
Github GHSA Github GHSA GHSA-fm6c-f59h-7mmg MS SWIFT Remote Code Execution via unsafe PyYAML deserialization
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 04 Aug 2025 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Modelscope
Modelscope ms Swift
Vendors & Products Modelscope
Modelscope ms Swift

Fri, 01 Aug 2025 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-502
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 01 Aug 2025 16:00:00 +0000

Type Values Removed Values Added
Description A remote code execution (RCE) vulnerability exists in the ms-swift project version 3.3.0 due to unsafe deserialization in tests/run.py using yaml.load() from the PyYAML library (versions = 5.3.1). If an attacker can control the content of the YAML configuration file passed to the --run_config parameter, arbitrary code can be executed during deserialization. This can lead to full system compromise. The vulnerability is triggered when a malicious YAML file is loaded, allowing the execution of arbitrary Python commands such as os.system(). It is recommended to upgrade PyYAML to version 5.4 or higher, and to use yaml.safe_load() to mitigate the issue.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-08-01T17:22:46.516Z

Reserved: 2025-06-16T00:00:00.000Z

Link: CVE-2025-50460

cve-icon Vulnrichment

Updated: 2025-08-01T16:16:00.543Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-01T16:15:41.600

Modified: 2025-08-04T15:06:15.833

Link: CVE-2025-50460

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-08-04T09:13:03Z