Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65213: n/a

0
Critical
VulnerabilityCVE-2025-65213cvecve-2025-65213
Published: Mon Dec 15 2025 (12/15/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-65213 is a critical unsafe deserialization vulnerability in MooreThreads torch_musa library affecting all versions. The vulnerability arises from the use of Python's pickle. load() on user-controlled file paths in the compare_for_single_op() and nan_inf_track_for_single_op() functions without proper validation. This allows attackers to craft malicious pickle files that execute arbitrary Python code upon deserialization, leading to remote code execution with the privileges of the victim process. The vulnerability has a CVSS score of 9. 8, indicating a critical severity with network attack vector, no required privileges or user interaction, and full impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild. European organizations using torch_musa in AI or data processing workflows are at significant risk, especially those in countries with strong AI development sectors. Immediate mitigation involves restricting or validating input sources for pickle files, employing safer serialization methods, and isolating processes handling untrusted data. Given the critical nature and ease of exploitation, this vulnerability demands urgent attention to prevent potential widespread compromise.

AI-Powered Analysis

AILast updated: 12/22/2025, 19:29:17 UTC

Technical Analysis

CVE-2025-65213 is a critical security vulnerability identified in the MooreThreads torch_musa library, specifically within the torch_musa.utils.compare_tool module. The vulnerability stems from unsafe deserialization practices in the compare_for_single_op() and nan_inf_track_for_single_op() functions, which use Python's pickle.load() function on file paths that can be controlled by an attacker. Since pickle.load() can execute arbitrary code embedded within a serialized object, an attacker who can supply a malicious pickle file can trigger arbitrary code execution within the context of the victim process. This vulnerability does not require any privileges or user interaction and can be exploited remotely if an attacker can influence the file path input. The vulnerability affects all versions of torch_musa as no specific version restrictions are noted. The CVSS v3.1 score of 9.8 reflects its critical severity, with a network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact includes full compromise of confidentiality, integrity, and availability of the affected system. No patches or fixes are currently published, and no exploits have been reported in the wild yet. The underlying weakness corresponds to CWE-502 (Deserialization of Untrusted Data), a well-known and dangerous class of vulnerabilities. This issue is particularly concerning for environments where torch_musa is used to process untrusted or external data, such as AI model training or inference pipelines, where malicious actors could leverage this flaw to execute arbitrary commands, install malware, or pivot within networks.

Potential Impact

For European organizations, the impact of CVE-2025-65213 is substantial, particularly for those involved in AI research, machine learning, and data analytics where torch_musa may be integrated. Successful exploitation allows attackers to execute arbitrary code remotely with the same privileges as the application, potentially leading to full system compromise, data theft, disruption of services, or lateral movement within corporate networks. Confidentiality breaches could expose sensitive intellectual property or personal data protected under GDPR, leading to regulatory penalties and reputational damage. Integrity and availability impacts could disrupt critical AI workflows or data processing pipelines, causing operational downtime and financial losses. Given the critical CVSS score and the lack of required authentication or user interaction, the threat surface is broad, increasing the likelihood of exploitation if mitigations are not applied promptly. The absence of known exploits in the wild currently provides a window for proactive defense, but the vulnerability’s nature makes it a prime target for attackers once exploit code becomes available.

Mitigation Recommendations

1. Immediately audit all uses of torch_musa in your environment to identify any instances where pickle.load() is called on user-controllable inputs, especially within compare_for_single_op() and nan_inf_track_for_single_op() functions. 2. Implement strict input validation and sanitization to ensure that only trusted and verified pickle files are processed. 3. Where possible, replace pickle-based deserialization with safer alternatives such as JSON or other secure serialization formats that do not allow code execution. 4. Employ sandboxing or containerization techniques to isolate processes that handle deserialization of external data, limiting the impact of potential exploitation. 5. Monitor network and application logs for unusual file access patterns or execution behaviors that could indicate exploitation attempts. 6. Establish strict access controls and least privilege principles for services running torch_musa to minimize the privileges available to an attacker. 7. Stay alert for official patches or updates from MooreThreads and apply them immediately upon release. 8. Consider deploying runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions capable of detecting anomalous code execution related to deserialization attacks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69405ac4d9bcdf3f3dfb23d5

Added to database: 12/15/2025, 7:00:20 PM

Last enriched: 12/22/2025, 7:29:17 PM

Last updated: 2/7/2026, 3:28:03 AM

Views: 110

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats