PyTorch is a Python package that provides tensor computation. Prior to version 2.10.0, a vulnerability in PyTorch's `weights_only` unpickler allows an attacker to craft a malicious checkpoint file (`.pth`) that, when loaded with `torch.load(..., weights_only=True)`, can corrupt memory and potentially lead to arbitrary code execution. Version 2.10.0 fixes the issue.
Metrics
Affected Vendors & Products
References
History
Fri, 30 Jan 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Linuxfoundation
Linuxfoundation pytorch |
|
| CPEs | cpe:2.3:a:linuxfoundation:pytorch:*:*:*:*:*:python:*:* | |
| Vendors & Products |
Linuxfoundation
Linuxfoundation pytorch |
Thu, 29 Jan 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Wed, 28 Jan 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 28 Jan 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pytorch
Pytorch pytorch |
|
| Vendors & Products |
Pytorch
Pytorch pytorch |
Tue, 27 Jan 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PyTorch is a Python package that provides tensor computation. Prior to version 2.10.0, a vulnerability in PyTorch's `weights_only` unpickler allows an attacker to craft a malicious checkpoint file (`.pth`) that, when loaded with `torch.load(..., weights_only=True)`, can corrupt memory and potentially lead to arbitrary code execution. Version 2.10.0 fixes the issue. | |
| Title | PyTorch Vulnerable to Remote Code Execution via Untrusted Checkpoint Files | |
| Weaknesses | CWE-502 CWE-94 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-01-27T21:13:46.878Z
Updated: 2026-01-30T04:55:40.231Z
Reserved: 2026-01-26T19:06:16.059Z
Link: CVE-2026-24747
Updated: 2026-01-28T15:14:05.710Z
Status : Analyzed
Published: 2026-01-27T22:15:56.470
Modified: 2026-01-30T21:51:55.367
Link: CVE-2026-24747