Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-33251: CWE-94 Improper Control of Generation of Code ('Code Injection') in NVIDIA NeMo Framework

0
High
VulnerabilityCVE-2025-33251cvecve-2025-33251cwe-94
Published: Wed Feb 18 2026 (02/18/2026, 13:56:40 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: NeMo Framework

Description

NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.

AI-Powered Analysis

AILast updated: 02/18/2026, 14:27:37 UTC

Technical Analysis

CVE-2025-33251 is a vulnerability classified under CWE-94, indicating improper control over code generation leading to code injection within the NVIDIA NeMo Framework, a toolkit widely used for building conversational AI and natural language processing models. The flaw exists in all versions prior to 2.6.1 and allows an attacker with local access and limited privileges to execute arbitrary code remotely without requiring user interaction. The vulnerability arises because the framework does not adequately sanitize or control dynamically generated code, enabling malicious input to be executed as code. This can result in remote code execution (RCE), denial of service (DoS), information disclosure, and data tampering. The CVSS v3.1 score of 7.8 reflects high severity, with attack vector local, low attack complexity, low privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Although no exploits have been observed in the wild yet, the potential for exploitation is significant given the framework’s use in AI development environments. The vulnerability could be leveraged by attackers to compromise AI model training or inference pipelines, manipulate data, or disrupt services. The lack of a patch link suggests that remediation involves upgrading to version 2.6.1 or later, where the issue is presumably fixed. Organizations using NeMo Framework should audit their deployments, restrict local access, and monitor for suspicious activity related to code execution.

Potential Impact

For European organizations, the impact of CVE-2025-33251 is substantial, especially those engaged in AI research, development, and deployment using NVIDIA NeMo Framework. Successful exploitation could lead to unauthorized code execution, allowing attackers to manipulate AI models, corrupt data, or disrupt AI-driven services, which can have cascading effects on business operations and decision-making processes. Confidentiality breaches could expose sensitive training data or proprietary algorithms, while integrity violations might result in corrupted AI outputs or biased models. Availability impacts could disrupt critical AI services, affecting sectors like finance, healthcare, automotive, and telecommunications that increasingly rely on AI capabilities. The local attack vector means that insider threats or compromised internal systems pose a significant risk. Given the growing adoption of AI frameworks in Europe, this vulnerability could undermine trust in AI systems and cause regulatory compliance issues under GDPR if personal data is exposed or mishandled.

Mitigation Recommendations

To mitigate CVE-2025-33251, European organizations should immediately upgrade all NVIDIA NeMo Framework installations to version 2.6.1 or later, where the vulnerability is addressed. Until upgrades are applied, restrict local access to systems running NeMo Framework to trusted personnel only, employing strict access controls and monitoring. Implement application whitelisting and endpoint detection to identify anomalous code execution attempts. Conduct thorough code reviews and input validation in any custom extensions or scripts interfacing with NeMo to prevent injection vectors. Employ network segmentation to isolate AI development environments from broader enterprise networks, minimizing lateral movement risks. Regularly audit logs for unusual activity related to code generation or execution within NeMo. Additionally, integrate security testing into AI development pipelines to detect similar vulnerabilities early. Collaborate with NVIDIA support for any patches or guidance and stay informed about updates or exploit reports.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
nvidia
Date Reserved
2025-04-15T18:51:08.848Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6995c8846aea4a407a9d0cd2

Added to database: 2/18/2026, 2:11:16 PM

Last enriched: 2/18/2026, 2:27:37 PM

Last updated: 2/21/2026, 12:20:27 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats