Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-63cw-57p8-fm3p | PyTorch Vulnerable to Remote Code Execution via Untrusted Checkpoint Files |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 29 Jan 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Wed, 28 Jan 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 28 Jan 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pytorch
Pytorch pytorch |
|
| Vendors & Products |
Pytorch
Pytorch pytorch |
Tue, 27 Jan 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PyTorch is a Python package that provides tensor computation. Prior to version 2.10.0, a vulnerability in PyTorch's `weights_only` unpickler allows an attacker to craft a malicious checkpoint file (`.pth`) that, when loaded with `torch.load(..., weights_only=True)`, can corrupt memory and potentially lead to arbitrary code execution. Version 2.10.0 fixes the issue. | |
| Title | PyTorch Vulnerable to Remote Code Execution via Untrusted Checkpoint Files | |
| Weaknesses | CWE-502 CWE-94 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-28T15:14:13.263Z
Reserved: 2026-01-26T19:06:16.059Z
Link: CVE-2026-24747
Updated: 2026-01-28T15:14:05.710Z
Status : Received
Published: 2026-01-27T22:15:56.470
Modified: 2026-01-27T22:15:56.470
Link: CVE-2026-24747
OpenCVE Enrichment
Updated: 2026-01-28T12:22:21Z
Github GHSA