Description
The mamba language model framework thru 2.2.6 is vulnerable to insecure deserialization (CWE-502) when loading pre-trained models from HuggingFace Hub. The MambaLMHeadModel.from_pretrained() method uses torch.load() to load the pytorch_model.bin weight file without enabling the security-restrictive weights_only=True parameter. This allows the deserialization of arbitrary Python objects via the pickle module. An attacker can exploit this by publishing a malicious model repository on HuggingFace Hub. When a victim loads a model from this repository, arbitrary code is executed on the victim's system in the context of the mamba process.
Published: 2026-05-12
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability lies in the Mamba language model framework up to version 2.2.6. The library loads pre‑trained model weight files via torch.load without the security‑restrictive weights_only=True flag, permitting the execution of arbitrary Python objects deserialized by the pickle module. An attacker can publish a malicious model repository on HuggingFace Hub, and when a victim loads this model, arbitrary code runs in the context of the mamba process.

Affected Systems

Any installation of the Mamba language model framework 2.2.6 or earlier that uses the MambaLMHeadModel.from_pretrained() method to load models from HuggingFace Hub is vulnerable. The issue affects projects that rely on the default loading behavior for pre‑trained models and have not applied any mitigation such as disabling unsafe deserialization or verifying model integrity.

Risk and Exploitability

Because the flaw allows deserialization of malicious payloads, an attacker can achieve remote code execution on the victim machine. Based on the description, the attacker must host a malicious model on HuggingFace Hub, which the victim then pulls during model loading. This requires only network access to the hub and the victim’s use of the vulnerable model-loading function. The CVSS score is not provided, and the absence of an EPSS score and KEV listing suggest the vulnerability may not yet be actively exploited, but the potential impact remains high and acts as a significant risk for exposed deployments.

Generated by OpenCVE AI on May 12, 2026 at 18:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the newest version of the Mamba framework that enforces safe deserialization for model loading.
  • Modify the model‑loading routine to call torch.load(..., weights_only=True) or otherwise prevent pickle‑based deserialization when loading external models.
  • Restrict or whitelist trusted HuggingFace Hub repositories and avoid loading models from unverified sources.

Generated by OpenCVE AI on May 12, 2026 at 18:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 18:45:00 +0000

Type Values Removed Values Added
Title Insecure Deserialization in Mamba Language Model Framework 2.2.6 Allows Remote Code Execution
Weaknesses CWE-502

Tue, 12 May 2026 17:30:00 +0000

Type Values Removed Values Added
Description The mamba language model framework thru 2.2.6 is vulnerable to insecure deserialization (CWE-502) when loading pre-trained models from HuggingFace Hub. The MambaLMHeadModel.from_pretrained() method uses torch.load() to load the pytorch_model.bin weight file without enabling the security-restrictive weights_only=True parameter. This allows the deserialization of arbitrary Python objects via the pickle module. An attacker can exploit this by publishing a malicious model repository on HuggingFace Hub. When a victim loads a model from this repository, arbitrary code is executed on the victim's system in the context of the mamba process.
References

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-05-12T17:16:58.846Z

Reserved: 2026-03-09T00:00:00.000Z

Link: CVE-2026-31239

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-12T18:16:52.320

Modified: 2026-05-12T18:16:52.320

Link: CVE-2026-31239

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T18:30:22Z

Weaknesses