The Ludwig framework thru 0.10.4 is vulnerable to insecure deserialization (CWE-502) through its predict() method. When a user provides a dataset file path to the predict() method, the framework automatically determines the file format. If the file is a pickle (.pkl) file, it is loaded using pandas.read_pickle() without any validation or security restrictions. This allows the deserialization of arbitrary Python objects via the unsafe pickle module. A remote attacker can exploit this by providing a maliciously crafted pickle file, leading to arbitrary code execution on the system running the Ludwig prediction.
Metrics
Affected Vendors & Products
References
History
Wed, 13 May 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ludwig-ai
Ludwig-ai ludwig |
|
| Vendors & Products |
Ludwig-ai
Ludwig-ai ludwig |
Tue, 12 May 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Insecure Deserialization in Ludwig Framework Allows Remote Code Execution via Predict Method | |
| Weaknesses | CWE-502 |
Tue, 12 May 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Ludwig framework thru 0.10.4 is vulnerable to insecure deserialization (CWE-502) through its predict() method. When a user provides a dataset file path to the predict() method, the framework automatically determines the file format. If the file is a pickle (.pkl) file, it is loaded using pandas.read_pickle() without any validation or security restrictions. This allows the deserialization of arbitrary Python objects via the unsafe pickle module. A remote attacker can exploit this by providing a maliciously crafted pickle file, leading to arbitrary code execution on the system running the Ludwig prediction. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2026-05-12T00:00:00.000Z
Updated: 2026-05-12T17:13:00.667Z
Reserved: 2026-03-09T00:00:00.000Z
Link: CVE-2026-31237
No data.
Status : Received
Published: 2026-05-12T18:16:52.087
Modified: 2026-05-12T18:16:52.087
Link: CVE-2026-31237
No data.