Skip to main content

CVE-2025-3163: Code Injection in InternLM LMDeploy

Medium
VulnerabilityCVE-2025-3163cvecve-2025-3163code-injectioninjection
Published: Thu Apr 03 2025 (04/03/2025, 15:31:04 UTC)
Source: CVE
Vendor/Project: InternLM
Product: LMDeploy

Description

A vulnerability was found in InternLM LMDeploy up to 0.7.1. It has been declared as critical. Affected by this vulnerability is the function Open of the file lmdeploy/docs/en/conf.py. The manipulation leads to code injection. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 06/20/2025, 09:35:12 UTC

Technical Analysis

CVE-2025-3163 is a code injection vulnerability identified in the InternLM LMDeploy product, specifically affecting versions 0.7.0 and 0.7.1. The vulnerability resides in the 'Open' function within the file 'lmdeploy/docs/en/conf.py'. Code injection vulnerabilities allow an attacker to execute arbitrary code within the context of the vulnerable application. In this case, the vulnerability can be exploited locally, meaning an attacker must have access to the host system to trigger the flaw. The manipulation of input or configuration data processed by the 'Open' function leads to the injection of malicious code. Although the exploit has been publicly disclosed, there are no known exploits actively used in the wild at this time. The vulnerability has been classified as medium severity by the source, but given the nature of code injection and the critical classification mentioned, it warrants careful consideration. The lack of authentication or remote exploitation vector limits the attack surface to local users or processes with access to the host. However, if an attacker gains local access, they could leverage this vulnerability to escalate privileges, execute arbitrary commands, or compromise the integrity and confidentiality of the system running LMDeploy. LMDeploy is a deployment tool related to InternLM, which is presumably used in machine learning model deployment environments. Such environments often handle sensitive data and critical workloads, increasing the risk impact if exploited.

Potential Impact

For European organizations, the impact of this vulnerability depends on the adoption of InternLM LMDeploy in their infrastructure. Organizations using LMDeploy for deploying machine learning models or AI services could face significant risks if local attackers exploit this vulnerability. Potential impacts include unauthorized code execution leading to data breaches, manipulation of deployed models, disruption of AI services, and potential lateral movement within the network. Confidentiality could be compromised if sensitive data processed by the models is accessed or exfiltrated. Integrity could be affected if attackers alter model configurations or deployment scripts. Availability might be impacted if attackers disrupt the deployment environment or cause denial of service. Given that exploitation requires local access, the threat is more severe in environments where multiple users have access to the deployment hosts or where attackers can gain initial footholds through other means. European organizations in sectors such as finance, healthcare, and critical infrastructure that rely on AI deployments are particularly at risk. The public disclosure of the exploit increases the urgency to patch or mitigate the vulnerability to prevent potential exploitation.

Mitigation Recommendations

1. Immediate upgrade: Organizations should upgrade LMDeploy to a version beyond 0.7.1 once a patch is released by InternLM. Monitoring vendor communications for patches is critical. 2. Access control: Restrict local access to systems running LMDeploy to trusted administrators only. Implement strict user permissions and use role-based access controls to minimize the number of users who can interact with the vulnerable function. 3. Environment hardening: Use containerization or sandboxing to isolate LMDeploy processes, limiting the impact of potential code injection. 4. Input validation: Review and harden any configuration files or inputs processed by the 'Open' function to prevent injection of malicious code. 5. Monitoring and detection: Deploy host-based intrusion detection systems (HIDS) and monitor logs for suspicious activity related to LMDeploy processes. 6. Network segmentation: Isolate deployment environments from general user networks to reduce the risk of local attackers gaining access. 7. Incident response readiness: Prepare for potential exploitation by having response plans and forensic capabilities ready to detect and mitigate attacks involving LMDeploy. 8. Least privilege principle: Ensure LMDeploy runs with the minimum privileges necessary to reduce the potential impact of code execution.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-04-03T07:06:36.718Z
Cisa Enriched
true

Threat ID: 682d984bc4522896dcbf84c6

Added to database: 5/21/2025, 9:09:31 AM

Last enriched: 6/20/2025, 9:35:12 AM

Last updated: 8/12/2025, 4:28:53 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats