Skip to main content

CVE-2025-23298: CWE-94 Improper Control of Generation of Code ('Code Injection') in NVIDIA NVIDIA Merlin Transformers4Rec

High
VulnerabilityCVE-2025-23298cvecve-2025-23298cwe-94
Published: Wed Aug 13 2025 (08/13/2025, 17:28:53 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: NVIDIA Merlin Transformers4Rec

Description

NVIDIA Merlin Transformers4Rec for all platforms contains a vulnerability in a python dependency, where an attacker could cause a code injection issue. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.

AI-Powered Analysis

AILast updated: 08/13/2025, 18:02:54 UTC

Technical Analysis

CVE-2025-23298 is a high-severity vulnerability affecting NVIDIA Merlin Transformers4Rec, a recommendation system framework leveraging transformer models. The vulnerability stems from improper control of code generation (CWE-94) in a Python dependency used by the product. Specifically, this code injection flaw allows an attacker with limited privileges (local access with low privileges) to execute arbitrary code without requiring user interaction. The vulnerability is present in all versions of the software that do not include the code commit b7eaea5, which presumably contains the patch. Exploiting this vulnerability could lead to full code execution on the affected system, enabling escalation of privileges, unauthorized disclosure of sensitive information, and tampering with data integrity and availability. The CVSS v3.1 score of 7.8 reflects the high impact on confidentiality, integrity, and availability, combined with relatively low attack complexity and no user interaction required. The attack vector is local (AV:L), meaning the attacker must have some level of access to the system, but only low privileges (PR:L) are needed. The vulnerability scope is unchanged (S:U), indicating the exploit affects only the vulnerable component without impacting other system components. No known exploits are currently reported in the wild, but the potential impact warrants immediate attention. The vulnerability highlights risks in supply chain dependencies, particularly in machine learning frameworks that rely on dynamic code execution or generation. Organizations using NVIDIA Merlin Transformers4Rec should verify their versions and apply the patch or update to the fixed commit to mitigate this risk.

Potential Impact

For European organizations, the impact of CVE-2025-23298 can be significant, especially for those deploying NVIDIA Merlin Transformers4Rec in production environments for recommendation systems, personalization engines, or AI-driven analytics. Successful exploitation could lead to unauthorized code execution, allowing attackers to escalate privileges and gain control over critical systems. This could result in data breaches involving sensitive personal data protected under GDPR, intellectual property theft, or disruption of AI services that may be business-critical. The ability to tamper with data integrity and availability could undermine trust in AI-driven decision-making processes and cause operational downtime. Given the local attack vector, insider threats or compromised user accounts could be leveraged to exploit this vulnerability. The high confidentiality and integrity impact also raise concerns for sectors handling sensitive data, such as finance, healthcare, and telecommunications. Furthermore, the reliance on Python dependencies underscores the importance of secure software supply chain management in AI/ML deployments.

Mitigation Recommendations

1. Immediate update or patch: Organizations should verify if their NVIDIA Merlin Transformers4Rec installations include the code commit b7eaea5 or later. If not, they must update to the patched version as soon as possible. 2. Restrict local access: Since the attack vector is local, enforce strict access controls and limit user privileges on systems running the vulnerable software. 3. Monitor and audit: Implement enhanced logging and monitoring to detect unusual code execution or privilege escalation attempts related to the affected components. 4. Dependency management: Review and harden the Python dependency management process to prevent introduction of vulnerable packages. Use tools to scan for known vulnerabilities in dependencies regularly. 5. Network segmentation: Isolate systems running Merlin Transformers4Rec to reduce risk from lateral movement if an attacker gains initial access. 6. Incident response readiness: Prepare to respond to potential exploitation attempts, including forensic analysis and containment strategies. 7. Educate developers and operators about secure coding and deployment practices to minimize risks from code injection vulnerabilities in AI frameworks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
nvidia
Date Reserved
2025-01-14T01:06:26.350Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689ccfdaad5a09ad004fb4fc

Added to database: 8/13/2025, 5:48:10 PM

Last enriched: 8/13/2025, 6:02:54 PM

Last updated: 8/15/2025, 11:17:01 AM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats