Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-33250: CWE-94 Improper Control of Generation of Code ('Code Injection') in NVIDIA NeMo Framework

0
High
VulnerabilityCVE-2025-33250cvecve-2025-33250cwe-94
Published: Wed Feb 18 2026 (02/18/2026, 13:56:28 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: NeMo Framework

Description

NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 08:18:02 UTC

Technical Analysis

CVE-2025-33250 is a vulnerability classified under CWE-94 (Improper Control of Generation of Code) found in the NVIDIA NeMo Framework, a toolkit widely used for building AI and conversational models. The flaw exists in all versions prior to 2.6.1 and allows an attacker with local privileges to inject and execute arbitrary code remotely. This vulnerability arises because the framework does not properly validate or control dynamically generated code, enabling malicious input to be executed within the application context. The CVSS 3.1 score of 7.8 indicates high severity, with an attack vector requiring local access (AV:L), low attack complexity (AC:L), and privileges (PR:L), but no user interaction (UI:N). Successful exploitation can lead to remote code execution, denial of service by crashing or destabilizing the framework, unauthorized disclosure of sensitive information, and tampering with data integrity. Although no public exploits have been reported yet, the potential impact on confidentiality, integrity, and availability is significant, especially in environments relying on NeMo for critical AI workloads. The vulnerability highlights the risks of improper code generation controls in AI frameworks, which can be leveraged by insiders or attackers who gain local access to escalate privileges or disrupt services. NVIDIA has published the vulnerability details but no patch links are currently available, indicating that remediation may be pending or in progress.

Potential Impact

The impact of CVE-2025-33250 is substantial for organizations utilizing the NVIDIA NeMo Framework in AI development and deployment. Remote code execution enables attackers to execute arbitrary commands, potentially leading to full system compromise. This can result in unauthorized access to sensitive AI models, training data, and intellectual property, causing confidentiality breaches. Data tampering risks undermine the integrity of AI outputs, which can have downstream effects on decision-making processes relying on these models. Denial of service conditions may disrupt AI services, impacting business continuity and operational efficiency. Given the framework's role in AI pipelines, exploitation could affect research institutions, technology companies, and enterprises deploying AI solutions. The requirement for local privileges limits remote exploitation but does not eliminate risk, as insider threats or lateral movement within compromised networks could enable attacks. The absence of known exploits currently provides a window for proactive mitigation, but the high severity score underscores the urgency of addressing this vulnerability to prevent potential exploitation.

Mitigation Recommendations

To mitigate CVE-2025-33250, organizations should prioritize upgrading the NVIDIA NeMo Framework to version 2.6.1 or later once the patch is officially released. Until then, restrict access to systems running vulnerable versions by enforcing strict access controls and limiting local user privileges to trusted personnel only. Implement network segmentation to isolate AI development environments from broader enterprise networks, reducing the risk of lateral movement. Employ application whitelisting and runtime application self-protection (RASP) mechanisms to detect and block unauthorized code execution attempts within the NeMo framework. Conduct regular audits and monitoring of logs for unusual activities indicative of code injection attempts. Educate developers and administrators about the risks of improper code generation and enforce secure coding practices when extending or customizing the framework. Additionally, maintain up-to-date endpoint protection and intrusion detection systems to identify potential exploitation attempts early. Collaborate with NVIDIA support channels to receive timely updates and advisories related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
nvidia
Date Reserved
2025-04-15T18:51:08.847Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6995c8846aea4a407a9d0ccd

Added to database: 2/18/2026, 2:11:16 PM

Last enriched: 2/27/2026, 8:18:02 AM

Last updated: 4/5/2026, 6:31:31 AM

Views: 24

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses