LLama Factory enables fine-tuning of large language models. Prior to version 1.0.0, a critical vulnerability exists in the `llamafy_baichuan2.py` script of the LLaMA-Factory project. The script performs insecure deserialization using `torch.load()` on user-supplied `.bin` files from an input directory. An attacker can exploit this behavior by crafting a malicious `.bin` file that executes arbitrary commands during deserialization. This issue has been patched in version 1.0.0.
References
Link | Resource |
---|---|
https://github.com/hiyouga/LLaMA-Factory/commit/2989d39239d2f46e584c1e1180ba46b9768afb2a | Patch |
https://github.com/hiyouga/LLaMA-Factory/security/advisories/GHSA-f2f7-gj54-6vpv | Exploit Vendor Advisory |
https://github.com/hiyouga/LLaMA-Factory/security/advisories/GHSA-f2f7-gj54-6vpv | Exploit Vendor Advisory |
Configurations
History
17 Jun 2025, 14:19
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/hiyouga/LLaMA-Factory/commit/2989d39239d2f46e584c1e1180ba46b9768afb2a - Patch | |
References | () https://github.com/hiyouga/LLaMA-Factory/security/advisories/GHSA-f2f7-gj54-6vpv - Exploit, Vendor Advisory | |
First Time |
Hiyouga llama-factory
Hiyouga |
|
CPE | cpe:2.3:a:hiyouga:llama-factory:*:*:*:*:*:*:*:* |
02 May 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/hiyouga/LLaMA-Factory/security/advisories/GHSA-f2f7-gj54-6vpv - |
02 May 2025, 13:52
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
01 May 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-01 18:15
Updated : 2025-06-17 14:19
NVD link : CVE-2025-46567
Mitre link : CVE-2025-46567
CVE.ORG link : CVE-2025-46567
JSON object : View
Products Affected
hiyouga
- llama-factory
CWE
CWE-502
Deserialization of Untrusted Data