CVE-2025-14931: CWE-502: Deserialization of Untrusted Data in Hugging Face smolagents
Hugging Face smolagents Remote Python Executor Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hugging Face smolagents. Authentication is not required to exploit this vulnerability. The specific flaw exists within the parsing of pickle data. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-28312.
AI Analysis
Technical Summary
CVE-2025-14931 is a critical vulnerability affecting Hugging Face smolagents version 1.22.0, stemming from unsafe deserialization of untrusted data using Python's pickle module. The vulnerability is classified under CWE-502, which involves deserialization of untrusted data leading to remote code execution (RCE). The core issue lies in the smolagents' remote Python executor component that parses incoming pickle data without proper validation or sanitization. Because pickle inherently allows execution of arbitrary code during deserialization, an attacker can craft malicious pickle payloads that, when processed by the vulnerable service, execute arbitrary commands with the privileges of the running service account. The vulnerability requires no authentication or user interaction, and the attack vector is network accessible, making it highly exploitable. The CVSS v3.0 score is 10.0 (critical), reflecting the ease of exploitation and the severe impact on confidentiality, integrity, and availability. No official patches or mitigations are currently published, and no known exploits have been reported in the wild as of now. The vulnerability was assigned by ZDI (ZDI-CAN-28312) and publicly disclosed on December 23, 2025. Given Hugging Face's prominence in AI and machine learning ecosystems, this vulnerability poses a significant threat to environments running smolagents, especially those exposed to untrusted networks or external inputs.
Potential Impact
The impact of CVE-2025-14931 on European organizations can be severe. Successful exploitation allows attackers to execute arbitrary code remotely without authentication, potentially leading to full system compromise. This can result in unauthorized data access or exfiltration, disruption of AI/ML services, and lateral movement within networks. Organizations relying on Hugging Face smolagents for AI workloads, research, or production systems may face operational downtime, intellectual property theft, and reputational damage. Critical infrastructure or sectors using AI for automation or decision-making could experience cascading failures. The vulnerability's ease of exploitation increases the likelihood of targeted attacks or automated scanning campaigns. Given the growing adoption of AI technologies across Europe, the threat surface is expanding, making timely mitigation essential to prevent exploitation and associated impacts.
Mitigation Recommendations
1. Immediately restrict network access to Hugging Face smolagents instances, limiting exposure to trusted internal networks only. 2. Implement strict input validation and sanitization on all data inputs accepted by smolagents, especially those involving serialized data formats. 3. Monitor network traffic and logs for anomalous or unexpected pickle data payloads indicative of exploitation attempts. 4. Employ application-layer firewalls or intrusion detection/prevention systems configured to detect and block malicious deserialization patterns. 5. Isolate smolagents services in segmented environments with minimal privileges to contain potential compromises. 6. Engage with Hugging Face for official patches or updates and apply them promptly once available. 7. Consider disabling or replacing the vulnerable deserialization functionality if feasible until a patch is released. 8. Conduct security awareness and training for development and operations teams on the risks of unsafe deserialization and secure coding practices. 9. Regularly audit and update dependencies and third-party components to reduce exposure to similar vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-14931: CWE-502: Deserialization of Untrusted Data in Hugging Face smolagents
Description
Hugging Face smolagents Remote Python Executor Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hugging Face smolagents. Authentication is not required to exploit this vulnerability. The specific flaw exists within the parsing of pickle data. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-28312.
AI-Powered Analysis
Technical Analysis
CVE-2025-14931 is a critical vulnerability affecting Hugging Face smolagents version 1.22.0, stemming from unsafe deserialization of untrusted data using Python's pickle module. The vulnerability is classified under CWE-502, which involves deserialization of untrusted data leading to remote code execution (RCE). The core issue lies in the smolagents' remote Python executor component that parses incoming pickle data without proper validation or sanitization. Because pickle inherently allows execution of arbitrary code during deserialization, an attacker can craft malicious pickle payloads that, when processed by the vulnerable service, execute arbitrary commands with the privileges of the running service account. The vulnerability requires no authentication or user interaction, and the attack vector is network accessible, making it highly exploitable. The CVSS v3.0 score is 10.0 (critical), reflecting the ease of exploitation and the severe impact on confidentiality, integrity, and availability. No official patches or mitigations are currently published, and no known exploits have been reported in the wild as of now. The vulnerability was assigned by ZDI (ZDI-CAN-28312) and publicly disclosed on December 23, 2025. Given Hugging Face's prominence in AI and machine learning ecosystems, this vulnerability poses a significant threat to environments running smolagents, especially those exposed to untrusted networks or external inputs.
Potential Impact
The impact of CVE-2025-14931 on European organizations can be severe. Successful exploitation allows attackers to execute arbitrary code remotely without authentication, potentially leading to full system compromise. This can result in unauthorized data access or exfiltration, disruption of AI/ML services, and lateral movement within networks. Organizations relying on Hugging Face smolagents for AI workloads, research, or production systems may face operational downtime, intellectual property theft, and reputational damage. Critical infrastructure or sectors using AI for automation or decision-making could experience cascading failures. The vulnerability's ease of exploitation increases the likelihood of targeted attacks or automated scanning campaigns. Given the growing adoption of AI technologies across Europe, the threat surface is expanding, making timely mitigation essential to prevent exploitation and associated impacts.
Mitigation Recommendations
1. Immediately restrict network access to Hugging Face smolagents instances, limiting exposure to trusted internal networks only. 2. Implement strict input validation and sanitization on all data inputs accepted by smolagents, especially those involving serialized data formats. 3. Monitor network traffic and logs for anomalous or unexpected pickle data payloads indicative of exploitation attempts. 4. Employ application-layer firewalls or intrusion detection/prevention systems configured to detect and block malicious deserialization patterns. 5. Isolate smolagents services in segmented environments with minimal privileges to contain potential compromises. 6. Engage with Hugging Face for official patches or updates and apply them promptly once available. 7. Consider disabling or replacing the vulnerable deserialization functionality if feasible until a patch is released. 8. Conduct security awareness and training for development and operations teams on the risks of unsafe deserialization and secure coding practices. 9. Regularly audit and update dependencies and third-party components to reduce exposure to similar vulnerabilities.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- zdi
- Date Reserved
- 2025-12-18T20:50:09.611Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 694b06504eddf7475afca195
Added to database: 12/23/2025, 9:14:56 PM
Last enriched: 12/31/2025, 12:16:20 AM
Last updated: 2/7/2026, 8:30:08 AM
Views: 56
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2078: Improper Authorization in yeqifu warehouse
MediumCVE-2026-25533: CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') in agentfront enclave
MediumCVE-2026-25123: CWE-918: Server-Side Request Forgery (SSRF) in homarr-labs homarr
MediumCVE-2025-68621: CWE-208: Observable Timing Discrepancy in TriliumNext Trilium
HighCVE-2026-2074: XML External Entity Reference in O2OA
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.