Metrics
Affected Vendors & Products
Tue, 28 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:huggingface:lerobot:*:*:*:*:*:python:*:* | |
| Metrics |
cvssV3_1
|
Tue, 28 Apr 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Huggingface
Huggingface lerobot |
|
| Vendors & Products |
Huggingface
Huggingface lerobot |
Fri, 24 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 23 Apr 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | LeRobot contains an unsafe deserialization vulnerability in the async inference pipeline where pickle.loads() is used to deserialize data received over unauthenticated gRPC channels without TLS in the policy server and robot client components. An unauthenticated network-reachable attacker can achieve arbitrary code execution on the server or client by sending a crafted pickle payload through the SendPolicyInstructions, SendObservations, or GetActions gRPC calls. | LeRobot through 0.5.1 contains an unsafe deserialization vulnerability in the async inference pipeline where pickle.loads() is used to deserialize data received over unauthenticated gRPC channels without TLS in the policy server and robot client components. An unauthenticated network-reachable attacker can achieve arbitrary code execution on the server or client by sending a crafted pickle payload through the SendPolicyInstructions, SendObservations, or GetActions gRPC calls. |
Thu, 23 Apr 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 23 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | LeRobot contains an unsafe deserialization vulnerability in the async inference pipeline where pickle.loads() is used to deserialize data received over unauthenticated gRPC channels without TLS in the policy server and robot client components. An unauthenticated network-reachable attacker can achieve arbitrary code execution on the server or client by sending a crafted pickle payload through the SendPolicyInstructions, SendObservations, or GetActions gRPC calls. | |
| Title | LeRobot Unsafe Deserialization Remote Code Execution via gRPC | |
| Weaknesses | CWE-502 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2026-04-23T19:45:01.090Z
Updated: 2026-04-24T18:20:13.815Z
Reserved: 2026-02-06T19:12:03.464Z
Link: CVE-2026-25874
Updated: 2026-04-24T14:34:15.589Z
Status : Analyzed
Published: 2026-04-23T20:16:13.903
Modified: 2026-04-28T19:01:40.377
Link: CVE-2026-25874
No data.
ReportizFlow