Skip to main content

CVE-2025-23307: CWE-94 Improper Control of Generation of Code ('Code Injection') in NVIDIA NVIDIA NeMo Curator

High
VulnerabilityCVE-2025-23307cvecve-2025-23307cwe-94
Published: Tue Aug 26 2025 (08/26/2025, 18:25:04 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: NVIDIA NeMo Curator

Description

NVIDIA NeMo Curator for all platforms contains a vulnerability where a malicious file created by an attacker could allow code injection. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.

AI-Powered Analysis

AILast updated: 09/03/2025, 01:14:35 UTC

Technical Analysis

CVE-2025-23307 is a high-severity vulnerability affecting NVIDIA NeMo Curator, a software product used for managing and curating AI models and datasets. The vulnerability is classified under CWE-94, which pertains to improper control of code generation, commonly known as code injection. Specifically, this flaw allows an attacker to craft a malicious file that, when processed by NeMo Curator versions prior to 25.07, can inject arbitrary code into the application’s execution context. Exploitation of this vulnerability does not require user interaction but does require local access with limited privileges (low privilege user). The vulnerability enables an attacker to execute arbitrary code, potentially escalating privileges, disclosing sensitive information, and tampering with data. The CVSS v3.1 score of 7.8 reflects a high severity, with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No known exploits have been reported in the wild yet, but the risk remains significant due to the potential impact and ease of exploitation once local access is obtained. The vulnerability affects all versions of NVIDIA NeMo Curator prior to 25.07, and no official patches or mitigation links have been published at this time. Given the nature of the software, which is often used in AI development environments, the vulnerability could be leveraged to compromise AI model integrity, leak proprietary datasets, or disrupt AI workflows.

Potential Impact

For European organizations, the impact of CVE-2025-23307 can be substantial, especially those involved in AI research, development, and deployment using NVIDIA NeMo Curator. Successful exploitation could lead to unauthorized code execution within AI management environments, resulting in the compromise of sensitive intellectual property, including proprietary AI models and datasets. This could undermine competitive advantage and lead to significant financial and reputational damage. Additionally, data tampering could corrupt AI training data or models, leading to flawed AI outputs and decisions, which is critical in sectors like healthcare, finance, and autonomous systems prevalent in Europe. Information disclosure risks may expose confidential data subject to GDPR, leading to regulatory penalties. The escalation of privileges could allow attackers to move laterally within networks, increasing the scope of compromise. The local attack vector requirement somewhat limits remote exploitation but does not eliminate risk, especially in environments with multiple users or where attackers have gained initial footholds through other means. The lack of user interaction requirement increases the threat level in automated or unattended systems.

Mitigation Recommendations

European organizations should prioritize upgrading NVIDIA NeMo Curator to version 25.07 or later as soon as it becomes available to address this vulnerability. Until patches are released, organizations should implement strict access controls to limit local user privileges and restrict who can upload or process files within NeMo Curator environments. Employing application whitelisting and monitoring for anomalous file creation or execution activities can help detect exploitation attempts. Network segmentation should isolate AI development environments from broader enterprise networks to contain potential breaches. Regular auditing of user accounts and permissions, combined with endpoint detection and response (EDR) solutions, can help identify suspicious behavior indicative of exploitation. Additionally, organizations should enforce strict file validation and sanitization policies before files are ingested by NeMo Curator to reduce the risk of malicious file processing. Finally, maintaining comprehensive backups of AI models and datasets will aid recovery in case of data tampering.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
nvidia
Date Reserved
2025-01-14T01:06:27.219Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ae0155ad5a09ad005ac21b

Added to database: 8/26/2025, 6:47:49 PM

Last enriched: 9/3/2025, 1:14:35 AM

Last updated: 9/4/2025, 1:23:30 PM

Views: 41

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats