Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-23251: CWE-94: Improper Control of Generation of Code ('Code Injection') in NVIDIA NeMo Framework

0
High
VulnerabilityCVE-2025-23251cvecve-2025-23251cwe-94
Published: Tue Apr 22 2025 (04/22/2025, 15:42:03 UTC)
Source: CVE
Vendor/Project: NVIDIA
Product: NeMo Framework

Description

NVIDIA NeMo Framework contains a vulnerability where a user could cause an improper control of generation of code by remote code execution. A successful exploit of this vulnerability might lead to code execution and data tampering.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 20:56:25 UTC

Technical Analysis

CVE-2025-23251 is a vulnerability classified under CWE-94 (Improper Control of Generation of Code) found in the NVIDIA NeMo Framework, a toolkit widely used for building conversational AI models. The flaw allows an attacker to remotely execute code by manipulating the framework's code generation process improperly. This vulnerability arises because the framework does not adequately control or sanitize inputs that influence code generation, enabling injection of malicious code. Exploitation requires no privileges but does require user interaction, such as triggering the processing of crafted inputs. The vulnerability affects all versions prior to 25.02, and while no public exploits are known yet, the potential for remote code execution and data tampering is significant. The CVSS v3.1 score is 7.6, reflecting a high severity with network attack vector, low attack complexity, no privileges required, but user interaction needed. The impact includes potential unauthorized code execution, data integrity compromise, and partial availability degradation. The vulnerability is particularly critical for organizations leveraging NeMo for AI workloads, as it could allow attackers to manipulate AI model behavior or exfiltrate sensitive data. NVIDIA has not yet published a patch link, but upgrading to version 25.02 or later is expected to remediate the issue. The vulnerability is tracked and enriched by CISA, indicating its recognized importance in the cybersecurity community.

Potential Impact

The vulnerability poses a significant risk to organizations using the NVIDIA NeMo Framework, especially those deploying AI and machine learning models in production environments. Successful exploitation can lead to remote code execution, allowing attackers to run arbitrary code within the context of the vulnerable application. This can result in unauthorized data tampering, leakage of sensitive information, and potential disruption of AI services. The integrity of AI models could be compromised, leading to incorrect or malicious outputs, which is critical in sectors relying on AI for decision-making such as healthcare, finance, and autonomous systems. Additionally, partial availability impact could disrupt AI workflows, causing operational delays. Given the network attack vector and no privilege requirement, attackers can remotely target exposed NeMo instances, increasing the threat surface. The requirement for user interaction slightly reduces the risk but does not eliminate it, as social engineering or automated triggering could be employed. Overall, the vulnerability could undermine trust in AI systems and cause significant operational and reputational damage.

Mitigation Recommendations

To mitigate this vulnerability, organizations should promptly upgrade the NVIDIA NeMo Framework to version 25.02 or later once available, as this version addresses the improper code generation control. Until the patch is applied, restrict access to NeMo services to trusted users and networks, minimizing exposure to untrusted inputs. Implement strict input validation and sanitization on all data processed by the framework to prevent injection of malicious code. Employ network segmentation and firewall rules to limit external access to AI infrastructure. Monitor logs and network traffic for unusual activity indicative of exploitation attempts. Educate users about the risks of interacting with untrusted inputs that could trigger the vulnerability. Consider deploying runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions to detect and block suspicious behaviors. Regularly review and update security policies related to AI development environments. Finally, stay informed through NVIDIA and cybersecurity advisories for any updates or additional patches.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
nvidia
Date Reserved
2025-01-14T01:06:19.964Z
Cisa Enriched
true

Threat ID: 682d9847c4522896dcbf54e3

Added to database: 5/21/2025, 9:09:27 AM

Last enriched: 2/26/2026, 8:56:25 PM

Last updated: 3/26/2026, 8:29:18 AM

Views: 60

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses