CVE-2025-50460

A remote code execution (RCE) vulnerability exists in the ms-swift project version 3.3.0 due to unsafe deserialization in tests/run.py using yaml.load() from the PyYAML library (versions = 5.3.1). If an attacker can control the content of the YAML configuration file passed to the --run_config parameter, arbitrary code can be executed during deserialization. This can lead to full system compromise. The vulnerability is triggered when a malicious YAML file is loaded, allowing the execution of arbitrary Python commands such as os.system(). It is recommended to upgrade PyYAML to version 5.4 or higher, and to use yaml.safe_load() to mitigate the issue.
Configurations

No configuration.

History

01 Aug 2025, 18:15

Type Values Removed Values Added
References () https://github.com/Anchor0221/CVE-2025-50460 - () https://github.com/Anchor0221/CVE-2025-50460 -
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CWE CWE-502

01 Aug 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-01 16:15

Updated : 2025-08-01 18:15


NVD link : CVE-2025-50460

Mitre link : CVE-2025-50460

CVE.ORG link : CVE-2025-50460


JSON object : View

Products Affected

No product.

CWE
CWE-502

Deserialization of Untrusted Data