Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-33233: CWE-94 Improper Control of Generation of Code ('Code Injection') in NVIDIA Merlin Transformers4Rec

0
High
VulnerabilityCVE-2025-33233cvecve-2025-33233cwe-94
Published: Tue Jan 20 2026 (01/20/2026, 17:43:38 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: Merlin Transformers4Rec

Description

CVE-2025-33233 is a high-severity code injection vulnerability in NVIDIA Merlin Transformers4Rec affecting all versions prior to commit 27ddd49. It allows an attacker with local privileges and low complexity to execute arbitrary code without user interaction, potentially leading to privilege escalation, information disclosure, and data tampering. The vulnerability arises from improper control over code generation (CWE-94). Although no known exploits are currently in the wild, the impact on confidentiality, integrity, and availability is high. European organizations using Merlin Transformers4Rec in AI/ML recommendation systems should prioritize patching or mitigating this flaw. Countries with significant AI technology adoption and NVIDIA product usage, such as Germany, France, and the UK, are most at risk. Mitigation involves applying the fixed commit, restricting local access, and auditing code inputs. Given the CVSS 7. 8 score, the threat is classified as high severity.

AI-Powered Analysis

AILast updated: 01/27/2026, 20:25:12 UTC

Technical Analysis

CVE-2025-33233 is a vulnerability classified under CWE-94, indicating improper control over code generation leading to code injection in NVIDIA's Merlin Transformers4Rec product. This product is used for building recommendation systems leveraging transformer architectures. The vulnerability affects all code branches that do not include the specific commit 27ddd49, which presumably contains the patch. The flaw allows an attacker with local access and low attack complexity to inject and execute arbitrary code within the context of the application. This can result in unauthorized code execution, escalation of privileges, disclosure of sensitive information, and tampering with data integrity and availability. The CVSS 3.1 base score of 7.8 reflects high severity, with attack vector being local (AV:L), requiring low attack complexity (AC:L), and low privileges (PR:L), but no user interaction (UI:N). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No known exploits have been reported in the wild as of the publication date (January 20, 2026). The vulnerability likely stems from unsafe handling of dynamic code generation or evaluation within the Merlin Transformers4Rec codebase, which could be exploited by malicious actors with access to the system to execute arbitrary commands or code. This poses a significant risk especially in environments where Merlin Transformers4Rec is deployed for AI-driven recommendation services, potentially exposing sensitive user data or critical system components.

Potential Impact

For European organizations, the impact of CVE-2025-33233 can be substantial, particularly for those leveraging NVIDIA Merlin Transformers4Rec in AI and machine learning pipelines for recommendation systems. Successful exploitation could lead to unauthorized code execution, allowing attackers to escalate privileges and gain deeper access to internal systems. This could result in theft or leakage of sensitive personal or corporate data, manipulation of recommendation outputs, and disruption of service availability. Given the high confidentiality, integrity, and availability impacts, organizations could face regulatory penalties under GDPR if personal data is compromised. Additionally, the disruption of AI-driven services could affect customer trust and business operations. The local attack vector means that insider threats or attackers who have gained initial footholds could exploit this vulnerability to move laterally or deepen their access. The absence of known exploits in the wild provides a window for proactive mitigation, but the risk remains high due to the potential severity of impact.

Mitigation Recommendations

To mitigate CVE-2025-33233, European organizations should immediately identify deployments of NVIDIA Merlin Transformers4Rec and verify if they are running versions prior to the commit 27ddd49. Applying the patch or updating to a version containing this commit is the most effective mitigation. In environments where immediate patching is not feasible, organizations should restrict local access to systems running Transformers4Rec, enforce strict access controls, and monitor for unusual local activity. Implementing application whitelisting and integrity monitoring can help detect unauthorized code execution attempts. Additionally, auditing and sanitizing any inputs or data that could influence code generation within the application is critical to prevent injection. Organizations should also review and harden privilege management to limit the impact of potential escalation. Finally, maintaining up-to-date threat intelligence and preparing incident response plans specific to AI/ML infrastructure vulnerabilities will enhance resilience.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
nvidia
Date Reserved
2025-04-15T18:51:07.602Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696fc0884623b1157c42b9f0

Added to database: 1/20/2026, 5:51:04 PM

Last enriched: 1/27/2026, 8:25:12 PM

Last updated: 2/7/2026, 2:22:26 AM

Views: 73

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats