Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-33236: CWE-94 Improper Control of Generation of Code ('Code Injection') in NVIDIA NeMo Framework

0
High
VulnerabilityCVE-2025-33236cvecve-2025-33236cwe-94
Published: Wed Feb 18 2026 (02/18/2026, 13:55:06 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: NeMo Framework

Description

NVIDIA NeMo Framework contains a vulnerability where malicious data created by an attacker could cause code injection. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 08:16:21 UTC

Technical Analysis

CVE-2025-33236 is a vulnerability classified under CWE-94 (Improper Control of Generation of Code) found in the NVIDIA NeMo Framework, a toolkit widely used for building conversational AI models. The vulnerability exists in all versions prior to 2.6.1 and allows an attacker to inject malicious code through crafted input data that the framework processes insecurely. This improper handling of code generation can lead to arbitrary code execution within the context of the NeMo process. The CVSS 3.1 base score of 7.8 reflects a high severity, with an attack vector requiring local access (AV:L), low attack complexity (AC:L), and low privileges (PR:L), but no user interaction (UI:N). Successful exploitation can result in critical impacts including confidentiality breaches, integrity violations through data tampering, and availability disruptions. Although no public exploits have been reported, the vulnerability poses a serious risk especially in environments where NeMo is used in multi-user or shared systems. The flaw highlights the importance of secure input validation and code generation controls in AI frameworks, which if neglected, can lead to severe security consequences.

Potential Impact

The potential impact of CVE-2025-33236 is significant for organizations utilizing the NVIDIA NeMo Framework, particularly those in AI research, development, and deployment. Exploitation could allow attackers to execute arbitrary code, leading to unauthorized access to sensitive AI models and data, modification or corruption of datasets, and disruption of AI services. This could undermine the integrity and confidentiality of AI workflows and intellectual property, potentially causing operational downtime and financial losses. In multi-tenant or shared computing environments, the vulnerability could facilitate lateral movement and privilege escalation, increasing the attack surface. Given the growing reliance on AI frameworks in critical sectors such as technology, finance, healthcare, and defense, the ramifications extend beyond individual organizations to broader economic and security domains. The absence of known exploits currently provides a window for proactive mitigation, but the high severity score underscores the urgency of addressing the vulnerability.

Mitigation Recommendations

To mitigate CVE-2025-33236 effectively, organizations should: 1) Upgrade the NVIDIA NeMo Framework to version 2.6.1 or later as soon as the patch is available, since no official patch links are currently provided, monitoring NVIDIA advisories is critical. 2) Restrict local access to systems running NeMo to trusted users only, minimizing the risk of exploitation by low-privilege attackers. 3) Implement strict input validation and sanitization controls around any data fed into the NeMo Framework to prevent malicious code injection. 4) Employ runtime application self-protection (RASP) or endpoint detection and response (EDR) tools to monitor and block anomalous behaviors indicative of code injection attempts. 5) Isolate AI development environments to reduce attack surface and prevent lateral movement. 6) Conduct regular security audits and code reviews focusing on AI frameworks and their dependencies. 7) Educate developers and system administrators about secure coding practices related to dynamic code generation. These targeted steps go beyond generic advice by focusing on the unique aspects of AI framework security and the specific attack vector involved.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
nvidia
Date Reserved
2025-04-15T18:51:08.191Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6995c8836aea4a407a9d0ca5

Added to database: 2/18/2026, 2:11:15 PM

Last enriched: 2/27/2026, 8:16:21 AM

Last updated: 4/5/2026, 6:31:01 AM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses