Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14931: CWE-502: Deserialization of Untrusted Data in Hugging Face smolagents

0
Critical
VulnerabilityCVE-2025-14931cvecve-2025-14931cwe-502
Published: Tue Dec 23 2025 (12/23/2025, 21:04:58 UTC)
Source: CVE Database V5
Vendor/Project: Hugging Face
Product: smolagents

Description

Hugging Face smolagents Remote Python Executor Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hugging Face smolagents. Authentication is not required to exploit this vulnerability. The specific flaw exists within the parsing of pickle data. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-28312.

AI-Powered Analysis

AILast updated: 12/31/2025, 00:16:20 UTC

Technical Analysis

CVE-2025-14931 is a critical vulnerability affecting Hugging Face smolagents version 1.22.0, stemming from unsafe deserialization of untrusted data using Python's pickle module. The vulnerability is classified under CWE-502, which involves deserialization of untrusted data leading to remote code execution (RCE). The core issue lies in the smolagents' remote Python executor component that parses incoming pickle data without proper validation or sanitization. Because pickle inherently allows execution of arbitrary code during deserialization, an attacker can craft malicious pickle payloads that, when processed by the vulnerable service, execute arbitrary commands with the privileges of the running service account. The vulnerability requires no authentication or user interaction, and the attack vector is network accessible, making it highly exploitable. The CVSS v3.0 score is 10.0 (critical), reflecting the ease of exploitation and the severe impact on confidentiality, integrity, and availability. No official patches or mitigations are currently published, and no known exploits have been reported in the wild as of now. The vulnerability was assigned by ZDI (ZDI-CAN-28312) and publicly disclosed on December 23, 2025. Given Hugging Face's prominence in AI and machine learning ecosystems, this vulnerability poses a significant threat to environments running smolagents, especially those exposed to untrusted networks or external inputs.

Potential Impact

The impact of CVE-2025-14931 on European organizations can be severe. Successful exploitation allows attackers to execute arbitrary code remotely without authentication, potentially leading to full system compromise. This can result in unauthorized data access or exfiltration, disruption of AI/ML services, and lateral movement within networks. Organizations relying on Hugging Face smolagents for AI workloads, research, or production systems may face operational downtime, intellectual property theft, and reputational damage. Critical infrastructure or sectors using AI for automation or decision-making could experience cascading failures. The vulnerability's ease of exploitation increases the likelihood of targeted attacks or automated scanning campaigns. Given the growing adoption of AI technologies across Europe, the threat surface is expanding, making timely mitigation essential to prevent exploitation and associated impacts.

Mitigation Recommendations

1. Immediately restrict network access to Hugging Face smolagents instances, limiting exposure to trusted internal networks only. 2. Implement strict input validation and sanitization on all data inputs accepted by smolagents, especially those involving serialized data formats. 3. Monitor network traffic and logs for anomalous or unexpected pickle data payloads indicative of exploitation attempts. 4. Employ application-layer firewalls or intrusion detection/prevention systems configured to detect and block malicious deserialization patterns. 5. Isolate smolagents services in segmented environments with minimal privileges to contain potential compromises. 6. Engage with Hugging Face for official patches or updates and apply them promptly once available. 7. Consider disabling or replacing the vulnerable deserialization functionality if feasible until a patch is released. 8. Conduct security awareness and training for development and operations teams on the risks of unsafe deserialization and secure coding practices. 9. Regularly audit and update dependencies and third-party components to reduce exposure to similar vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
zdi
Date Reserved
2025-12-18T20:50:09.611Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 694b06504eddf7475afca195

Added to database: 12/23/2025, 9:14:56 PM

Last enriched: 12/31/2025, 12:16:20 AM

Last updated: 2/7/2026, 4:38:07 AM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats