Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14928: CWE-94: Improper Control of Generation of Code ('Code Injection') in Hugging Face Transformers

0
High
VulnerabilityCVE-2025-14928cvecve-2025-14928cwe-94
Published: Tue Dec 23 2025 (12/23/2025, 21:04:48 UTC)
Source: CVE Database V5
Vendor/Project: Hugging Face
Product: Transformers

Description

Hugging Face Transformers HuBERT convert_config Code Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hugging Face Transformers. User interaction is required to exploit this vulnerability in that the target must convert a malicious checkpoint. The specific flaw exists within the convert_config function. The issue results from the lack of proper validation of a user-supplied string before using it to execute Python code. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-28253.

AI-Powered Analysis

AILast updated: 12/31/2025, 00:15:42 UTC

Technical Analysis

CVE-2025-14928 is a critical vulnerability identified in the Hugging Face Transformers library version 4.57.0, specifically within the convert_config function used for converting model checkpoint configurations. The root cause is improper control over code generation (CWE-94), where user-supplied strings are executed as Python code without adequate validation or sanitization. This allows an attacker who can supply a malicious checkpoint file to execute arbitrary Python code remotely in the context of the current user. Exploitation requires user interaction, meaning the victim must initiate the conversion of a malicious checkpoint. The vulnerability affects confidentiality, integrity, and availability by enabling attackers to run arbitrary commands, potentially leading to data theft, system compromise, or service disruption. The CVSS v3.0 score is 7.8, reflecting high severity due to the potential impact and ease of exploitation once the malicious input is processed. Although no public exploits are known yet, the widespread use of Hugging Face Transformers in AI and machine learning pipelines makes this a significant threat vector. The lack of patches at the time of disclosure necessitates immediate risk mitigation strategies. The vulnerability was assigned by ZDI (ZDI-CAN-28253) and publicly disclosed on December 23, 2025.

Potential Impact

For European organizations, the impact of CVE-2025-14928 can be substantial, especially those heavily invested in AI and machine learning workflows using Hugging Face Transformers. Successful exploitation could lead to unauthorized code execution, resulting in data breaches, intellectual property theft, or disruption of AI services. This could affect sectors such as finance, healthcare, automotive, and research institutions that rely on AI models for critical operations. The compromise of AI infrastructure could also undermine trust in AI-driven decision-making systems. Additionally, the vulnerability could be leveraged as a foothold for lateral movement within networks, escalating the severity of attacks. Given the high confidentiality, integrity, and availability impact, organizations face risks of regulatory penalties under GDPR if personal data is exposed. The requirement for user interaction limits mass exploitation but does not eliminate targeted attacks, especially in environments where model checkpoint conversions are routine.

Mitigation Recommendations

To mitigate CVE-2025-14928, European organizations should immediately audit their use of Hugging Face Transformers, particularly version 4.57.0, and avoid converting checkpoint files from untrusted or unauthenticated sources. Until an official patch is released, implement strict input validation and sanitization on any user-supplied data involved in model configuration conversions. Employ sandboxing or containerization techniques to isolate the conversion process, limiting the potential damage from arbitrary code execution. Monitor and restrict permissions of users and services performing model conversions to minimize privilege escalation risks. Incorporate security reviews into AI/ML pipeline workflows and educate developers and data scientists about the risks of processing untrusted model files. Stay alert for official patches or updates from Hugging Face and apply them promptly. Additionally, implement network segmentation and endpoint detection to identify suspicious activities related to model conversion processes.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
zdi
Date Reserved
2025-12-18T20:49:58.765Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 694b064e4eddf7475afca182

Added to database: 12/23/2025, 9:14:54 PM

Last enriched: 12/31/2025, 12:15:42 AM

Last updated: 2/4/2026, 5:26:42 PM

Views: 86

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats