Description
A weakness has been identified in FedML-AI FedML up to 0.8.9. Affected is the function sendMessage of the file grpc_server.py of the component gRPC server. Executing a manipulation can lead to deserialization. The attack may be performed from remote. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-04-05
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution via deserialization
Action: Patch Now
AI Analysis

Impact

The vulnerability exists in FedML’s gRPC server component, specifically in the sendMessage function of grpc_server.py. An attacker who can send a crafted message to the server can trigger unsafe deserialization of untrusted data. The flaw stems from improper input validation and the deserialization of potentially malicious payloads, which may allow the attacker to execute arbitrary code, compromising confidentiality, integrity or availability of the affected system.

Affected Systems

FedML-AI’s FedML product, versions up to 0.8.9, includes the vulnerable gRPC server. Any installation that uses the sendMessage function in grpc_server.py before or at this version is at risk. The product is commonly used in distributed machine learning environments where remote connections to the gRPC service are required.

Risk and Exploitability

The CVSS base score is 6.9, indicating medium severity. No EPSS data is available and the vulnerability is not listed in CISA’s KEV catalog. The injection can be performed remotely, relying on network traffic to the gRPC port. Because the flaw involves deserialization, without additional defenses an attacker with network access could possibly chain the vulnerability into remote code execution, making the risk significant for exposed deployments.

Generated by OpenCVE AI on April 5, 2026 at 06:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update to the latest FedML release that addresses the deserialization issue.
  • If an update is unavailable, temporarily limit access to the gRPC service by firewalling the listening port or applying network segmentation.
  • Verify that no untrusted input reaches the sendMessage endpoint; apply application‑level validation if possible.
  • Monitor logs for suspicious gRPC traffic and investigate any anomalies.
  • Contact FedML support for an official fix timeline.

Generated by OpenCVE AI on April 5, 2026 at 06:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 30 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Tensoropera
Tensoropera fedml
CPEs cpe:2.3:a:tensoropera:fedml:*:*:*:*:*:*:*:*
Vendors & Products Tensoropera
Tensoropera fedml

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Fedml-ai
Fedml-ai fedml
Vendors & Products Fedml-ai
Fedml-ai fedml

Mon, 06 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 05 Apr 2026 04:30:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in FedML-AI FedML up to 0.8.9. Affected is the function sendMessage of the file grpc_server.py of the component gRPC server. Executing a manipulation can lead to deserialization. The attack may be performed from remote. The vendor was contacted early about this disclosure but did not respond in any way.
Title FedML-AI FedML gRPC server grpc_server.py sendMessage deserialization
Weaknesses CWE-20
CWE-502
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:ND/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:X/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:X/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-06T14:51:18.212Z

Reserved: 2026-04-04T06:40:50.140Z

Link: CVE-2026-5536

cve-icon Vulnrichment

Updated: 2026-04-06T14:03:02.776Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-05T04:16:09.487

Modified: 2026-04-30T19:29:53.450

Link: CVE-2026-5536

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:57:18Z

Weaknesses