LeRobot through 0.5.1 contains an unsafe deserialization vulnerability in the async inference pipeline where pickle.loads() is used to deserialize data received over unauthenticated gRPC channels without TLS in the policy server and robot client components. An unauthenticated network-reachable attacker can achieve arbitrary code execution on the server or client by sending a crafted pickle payload through the SendPolicyInstructions, SendObservations, or GetActions gRPC calls.
References
| Link | Resource |
|---|---|
| https://chocapikk.com/posts/2026/lerobot-pickle-rce/ | Exploit Mitigation Third Party Advisory |
| https://github.com/huggingface/lerobot/issues/3047 | Exploit Issue Tracking Third Party Advisory |
| https://github.com/huggingface/lerobot/issues/3134 | Issue Tracking |
| https://github.com/huggingface/lerobot/pull/3048 | Issue Tracking Patch |
| https://www.vulncheck.com/advisories/lerobot-unsafe-deserialization-remote-code-execution-via-grpc | Third Party Advisory Exploit |
Configurations
History
28 Apr 2026, 19:01
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://chocapikk.com/posts/2026/lerobot-pickle-rce/ - Exploit, Mitigation, Third Party Advisory | |
| References | () https://github.com/huggingface/lerobot/issues/3047 - Exploit, Issue Tracking, Third Party Advisory | |
| References | () https://github.com/huggingface/lerobot/issues/3134 - Issue Tracking | |
| References | () https://github.com/huggingface/lerobot/pull/3048 - Issue Tracking, Patch | |
| References | () https://www.vulncheck.com/advisories/lerobot-unsafe-deserialization-remote-code-execution-via-grpc - Third Party Advisory, Exploit | |
| First Time |
Huggingface
Huggingface lerobot |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| CPE | cpe:2.3:a:huggingface:lerobot:*:*:*:*:*:python:*:* |
23 Apr 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (en) LeRobot through 0.5.1 contains an unsafe deserialization vulnerability in the async inference pipeline where pickle.loads() is used to deserialize data received over unauthenticated gRPC channels without TLS in the policy server and robot client components. An unauthenticated network-reachable attacker can achieve arbitrary code execution on the server or client by sending a crafted pickle payload through the SendPolicyInstructions, SendObservations, or GetActions gRPC calls. |
23 Apr 2026, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
23 Apr 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-23 20:16
Updated : 2026-04-28 19:01
NVD link : CVE-2026-25874
Mitre link : CVE-2026-25874
CVE.ORG link : CVE-2026-25874
JSON object : View
Products Affected
huggingface
- lerobot
CWE
CWE-502
Deserialization of Untrusted Data
