Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-57622: n/a

0
Unknown
VulnerabilityCVE-2025-57622cvecve-2025-57622
Published: Tue Mar 03 2026 (03/03/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue in Step-Video-T2V allows a remote attacker to execute arbitrary code via the /vae-api , /caption-api , feature = pickle.loads(request.get_data()) component

AI-Powered Analysis

AILast updated: 03/03/2026, 15:04:31 UTC

Technical Analysis

CVE-2025-57622 is a remote code execution (RCE) vulnerability identified in the Step-Video-T2V software, a tool likely involved in video processing or AI-based video transformation. The vulnerability stems from the unsafe use of Python's pickle.loads function on data received via the /vae-api and /caption-api endpoints. Specifically, the application deserializes incoming request data without proper validation or sanitization, allowing an attacker to craft malicious serialized objects that, when deserialized, execute arbitrary code on the server. This type of vulnerability is particularly dangerous because pickle deserialization can execute arbitrary Python code, making it a common vector for RCE attacks. The vulnerability does not have a CVSS score assigned yet, and no patches or known exploits are currently reported. The affected versions are unspecified, indicating that the issue may be present in all current releases of Step-Video-T2V. Exploitation requires an attacker to send a specially crafted request to one of the vulnerable API endpoints, potentially without needing authentication or user interaction, depending on the deployment environment. This vulnerability can lead to full system compromise, data theft, service disruption, or use of the compromised system as a foothold for further attacks.

Potential Impact

The impact of CVE-2025-57622 is severe for organizations using Step-Video-T2V, as it allows remote attackers to execute arbitrary code on affected systems. This can lead to complete compromise of the server hosting the application, resulting in unauthorized access to sensitive data, disruption of video processing services, and potential lateral movement within the network. The vulnerability threatens confidentiality by exposing data processed by the application, integrity by allowing attackers to alter or inject malicious content, and availability by enabling denial-of-service or ransomware attacks. Given that the vulnerability is remotely exploitable and does not appear to require authentication or user interaction, the attack surface is broad. Organizations relying on Step-Video-T2V for critical video or AI workloads may face operational downtime, reputational damage, and regulatory consequences if exploited. The lack of available patches increases the urgency for interim mitigations.

Mitigation Recommendations

To mitigate CVE-2025-57622, organizations should immediately restrict access to the /vae-api and /caption-api endpoints by implementing network-level controls such as firewalls or VPNs to limit exposure to trusted users only. Disable or remove the use of pickle.loads for deserializing untrusted input; if deserialization is necessary, replace pickle with safer serialization formats like JSON or use secure deserialization libraries that enforce strict type whitelisting. Monitor application logs and network traffic for unusual or malformed requests targeting these APIs. Employ runtime application self-protection (RASP) or web application firewalls (WAF) with custom rules to detect and block suspicious payloads. Conduct a thorough audit of all Step-Video-T2V deployments to identify vulnerable instances and isolate them until patches or updates become available. Engage with the vendor or open-source community for updates or patches. Additionally, implement robust endpoint detection and response (EDR) solutions to detect post-exploitation activities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-08-17T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a6f4b6d1a09e29cb4db064

Added to database: 3/3/2026, 2:48:22 PM

Last enriched: 3/3/2026, 3:04:31 PM

Last updated: 3/4/2026, 6:23:41 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses