CVE-2026-25874

LeRobot through 0.5.1 contains an unsafe deserialization vulnerability in the async inference pipeline where pickle.loads() is used to deserialize data received over unauthenticated gRPC channels without TLS in the policy server and robot client components. An unauthenticated network-reachable attacker can achieve arbitrary code execution on the server or client by sending a crafted pickle payload through the SendPolicyInstructions, SendObservations, or GetActions gRPC calls.
Configurations

Configuration 1 (hide)

cpe:2.3:a:huggingface:lerobot:*:*:*:*:*:python:*:*

History

28 Apr 2026, 19:01

Type Values Removed Values Added
References () https://chocapikk.com/posts/2026/lerobot-pickle-rce/ - () https://chocapikk.com/posts/2026/lerobot-pickle-rce/ - Exploit, Mitigation, Third Party Advisory
References () https://github.com/huggingface/lerobot/issues/3047 - () https://github.com/huggingface/lerobot/issues/3047 - Exploit, Issue Tracking, Third Party Advisory
References () https://github.com/huggingface/lerobot/issues/3134 - () https://github.com/huggingface/lerobot/issues/3134 - Issue Tracking
References () https://github.com/huggingface/lerobot/pull/3048 - () https://github.com/huggingface/lerobot/pull/3048 - Issue Tracking, Patch
References () https://www.vulncheck.com/advisories/lerobot-unsafe-deserialization-remote-code-execution-via-grpc - () https://www.vulncheck.com/advisories/lerobot-unsafe-deserialization-remote-code-execution-via-grpc - Third Party Advisory, Exploit
First Time Huggingface
Huggingface lerobot
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CPE cpe:2.3:a:huggingface:lerobot:*:*:*:*:*:python:*:*

23 Apr 2026, 22:16

Type Values Removed Values Added
Summary (en) LeRobot contains an unsafe deserialization vulnerability in the async inference pipeline where pickle.loads() is used to deserialize data received over unauthenticated gRPC channels without TLS in the policy server and robot client components. An unauthenticated network-reachable attacker can achieve arbitrary code execution on the server or client by sending a crafted pickle payload through the SendPolicyInstructions, SendObservations, or GetActions gRPC calls. (en) LeRobot through 0.5.1 contains an unsafe deserialization vulnerability in the async inference pipeline where pickle.loads() is used to deserialize data received over unauthenticated gRPC channels without TLS in the policy server and robot client components. An unauthenticated network-reachable attacker can achieve arbitrary code execution on the server or client by sending a crafted pickle payload through the SendPolicyInstructions, SendObservations, or GetActions gRPC calls.

23 Apr 2026, 21:16

Type Values Removed Values Added
References
  • () https://chocapikk.com/posts/2026/lerobot-pickle-rce/ -

23 Apr 2026, 20:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-23 20:16

Updated : 2026-04-28 19:01


NVD link : CVE-2026-25874

Mitre link : CVE-2026-25874

CVE.ORG link : CVE-2026-25874


JSON object : View

Products Affected

huggingface

  • lerobot
CWE
CWE-502

Deserialization of Untrusted Data