Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-23967 | SKOPS Card.get_model happily allows arbitrary code execution |
Github GHSA |
GHSA-378x-6p4f-8jgm | SKOPS Card.get_model happily allows arbitrary code execution |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 12 Aug 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Skops Project
Skops Project skops |
|
| Vendors & Products |
Skops Project
Skops Project skops |
Fri, 08 Aug 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 08 Aug 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Fri, 08 Aug 2025 00:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | skops is a Python library which helps users share and ship their scikit-learn based models. In versions 0.12.0 and below, the Card.get_model does not contain any logic to prevent arbitrary code execution. The Card.get_model function supports both joblib and skops for model loading. When loading .skops models, it uses skops' secure loading with trusted type validation, raising errors for untrusted types unless explicitly allowed. However, when non-.zip file formats are provided, the function silently falls back to joblib without warning. Unlike skops, joblib allows arbitrary code execution during loading, bypassing security measures and potentially enabling malicious code execution. This issue is fixed in version 0.13.0. | |
| Title | skops: Card.get_model does not block arbitrary code execution | |
| Weaknesses | CWE-502 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-08-08T16:54:00.636Z
Reserved: 2025-07-31T17:23:33.476Z
Link: CVE-2025-54886
Updated: 2025-08-08T16:53:55.631Z
Status : Awaiting Analysis
Published: 2025-08-08T01:15:25.120
Modified: 2025-08-08T20:30:18.180
Link: CVE-2025-54886
OpenCVE Enrichment
Updated: 2025-08-12T11:47:29Z
EUVD
Github GHSA