CVE-2025-3163: Code Injection in InternLM LMDeploy
A vulnerability was found in InternLM LMDeploy up to 0.7.1. It has been declared as critical. Affected by this vulnerability is the function Open of the file lmdeploy/docs/en/conf.py. The manipulation leads to code injection. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-3163 is a code injection vulnerability identified in the InternLM LMDeploy product, specifically affecting versions 0.7.0 and 0.7.1. The vulnerability resides in the 'Open' function within the file 'lmdeploy/docs/en/conf.py'. Code injection vulnerabilities allow an attacker to execute arbitrary code within the context of the vulnerable application. In this case, the vulnerability can be exploited locally, meaning an attacker must have access to the host system to trigger the flaw. The manipulation of input or configuration data processed by the 'Open' function leads to the injection of malicious code. Although the exploit has been publicly disclosed, there are no known exploits actively used in the wild at this time. The vulnerability has been classified as medium severity by the source, but given the nature of code injection and the critical classification mentioned, it warrants careful consideration. The lack of authentication or remote exploitation vector limits the attack surface to local users or processes with access to the host. However, if an attacker gains local access, they could leverage this vulnerability to escalate privileges, execute arbitrary commands, or compromise the integrity and confidentiality of the system running LMDeploy. LMDeploy is a deployment tool related to InternLM, which is presumably used in machine learning model deployment environments. Such environments often handle sensitive data and critical workloads, increasing the risk impact if exploited.
Potential Impact
For European organizations, the impact of this vulnerability depends on the adoption of InternLM LMDeploy in their infrastructure. Organizations using LMDeploy for deploying machine learning models or AI services could face significant risks if local attackers exploit this vulnerability. Potential impacts include unauthorized code execution leading to data breaches, manipulation of deployed models, disruption of AI services, and potential lateral movement within the network. Confidentiality could be compromised if sensitive data processed by the models is accessed or exfiltrated. Integrity could be affected if attackers alter model configurations or deployment scripts. Availability might be impacted if attackers disrupt the deployment environment or cause denial of service. Given that exploitation requires local access, the threat is more severe in environments where multiple users have access to the deployment hosts or where attackers can gain initial footholds through other means. European organizations in sectors such as finance, healthcare, and critical infrastructure that rely on AI deployments are particularly at risk. The public disclosure of the exploit increases the urgency to patch or mitigate the vulnerability to prevent potential exploitation.
Mitigation Recommendations
1. Immediate upgrade: Organizations should upgrade LMDeploy to a version beyond 0.7.1 once a patch is released by InternLM. Monitoring vendor communications for patches is critical. 2. Access control: Restrict local access to systems running LMDeploy to trusted administrators only. Implement strict user permissions and use role-based access controls to minimize the number of users who can interact with the vulnerable function. 3. Environment hardening: Use containerization or sandboxing to isolate LMDeploy processes, limiting the impact of potential code injection. 4. Input validation: Review and harden any configuration files or inputs processed by the 'Open' function to prevent injection of malicious code. 5. Monitoring and detection: Deploy host-based intrusion detection systems (HIDS) and monitor logs for suspicious activity related to LMDeploy processes. 6. Network segmentation: Isolate deployment environments from general user networks to reduce the risk of local attackers gaining access. 7. Incident response readiness: Prepare for potential exploitation by having response plans and forensic capabilities ready to detect and mitigate attacks involving LMDeploy. 8. Least privilege principle: Ensure LMDeploy runs with the minimum privileges necessary to reduce the potential impact of code execution.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Switzerland
CVE-2025-3163: Code Injection in InternLM LMDeploy
Description
A vulnerability was found in InternLM LMDeploy up to 0.7.1. It has been declared as critical. Affected by this vulnerability is the function Open of the file lmdeploy/docs/en/conf.py. The manipulation leads to code injection. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-3163 is a code injection vulnerability identified in the InternLM LMDeploy product, specifically affecting versions 0.7.0 and 0.7.1. The vulnerability resides in the 'Open' function within the file 'lmdeploy/docs/en/conf.py'. Code injection vulnerabilities allow an attacker to execute arbitrary code within the context of the vulnerable application. In this case, the vulnerability can be exploited locally, meaning an attacker must have access to the host system to trigger the flaw. The manipulation of input or configuration data processed by the 'Open' function leads to the injection of malicious code. Although the exploit has been publicly disclosed, there are no known exploits actively used in the wild at this time. The vulnerability has been classified as medium severity by the source, but given the nature of code injection and the critical classification mentioned, it warrants careful consideration. The lack of authentication or remote exploitation vector limits the attack surface to local users or processes with access to the host. However, if an attacker gains local access, they could leverage this vulnerability to escalate privileges, execute arbitrary commands, or compromise the integrity and confidentiality of the system running LMDeploy. LMDeploy is a deployment tool related to InternLM, which is presumably used in machine learning model deployment environments. Such environments often handle sensitive data and critical workloads, increasing the risk impact if exploited.
Potential Impact
For European organizations, the impact of this vulnerability depends on the adoption of InternLM LMDeploy in their infrastructure. Organizations using LMDeploy for deploying machine learning models or AI services could face significant risks if local attackers exploit this vulnerability. Potential impacts include unauthorized code execution leading to data breaches, manipulation of deployed models, disruption of AI services, and potential lateral movement within the network. Confidentiality could be compromised if sensitive data processed by the models is accessed or exfiltrated. Integrity could be affected if attackers alter model configurations or deployment scripts. Availability might be impacted if attackers disrupt the deployment environment or cause denial of service. Given that exploitation requires local access, the threat is more severe in environments where multiple users have access to the deployment hosts or where attackers can gain initial footholds through other means. European organizations in sectors such as finance, healthcare, and critical infrastructure that rely on AI deployments are particularly at risk. The public disclosure of the exploit increases the urgency to patch or mitigate the vulnerability to prevent potential exploitation.
Mitigation Recommendations
1. Immediate upgrade: Organizations should upgrade LMDeploy to a version beyond 0.7.1 once a patch is released by InternLM. Monitoring vendor communications for patches is critical. 2. Access control: Restrict local access to systems running LMDeploy to trusted administrators only. Implement strict user permissions and use role-based access controls to minimize the number of users who can interact with the vulnerable function. 3. Environment hardening: Use containerization or sandboxing to isolate LMDeploy processes, limiting the impact of potential code injection. 4. Input validation: Review and harden any configuration files or inputs processed by the 'Open' function to prevent injection of malicious code. 5. Monitoring and detection: Deploy host-based intrusion detection systems (HIDS) and monitor logs for suspicious activity related to LMDeploy processes. 6. Network segmentation: Isolate deployment environments from general user networks to reduce the risk of local attackers gaining access. 7. Incident response readiness: Prepare for potential exploitation by having response plans and forensic capabilities ready to detect and mitigate attacks involving LMDeploy. 8. Least privilege principle: Ensure LMDeploy runs with the minimum privileges necessary to reduce the potential impact of code execution.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-04-03T07:06:36.718Z
- Cisa Enriched
- true
Threat ID: 682d984bc4522896dcbf84c6
Added to database: 5/21/2025, 9:09:31 AM
Last enriched: 6/20/2025, 9:35:12 AM
Last updated: 8/12/2025, 4:28:53 AM
Views: 12
Related Threats
CVE-2025-9016: Uncontrolled Search Path in Mechrevo Control Center GX V2
HighCVE-2025-8451: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpdevteam Essential Addons for Elementor – Popular Elementor Templates & Widgets
MediumCVE-2025-8013: CWE-918 Server-Side Request Forgery (SSRF) in quttera Quttera Web Malware Scanner
LowCVE-2025-6679: CWE-434 Unrestricted Upload of File with Dangerous Type in bitpressadmin Bit Form – Custom Contact Form, Multi Step, Conversational, Payment & Quiz Form builder
CriticalCVE-2025-9013: SQL Injection in PHPGurukul Online Shopping Portal Project
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.