Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-71002: n/a

0
Unknown
VulnerabilityCVE-2025-71002cvecve-2025-71002
Published: Wed Jan 28 2026 (01/28/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

A floating-point exception (FPE) in the flow.column_stack component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.

AI-Powered Analysis

AILast updated: 01/28/2026, 19:50:15 UTC

Technical Analysis

CVE-2025-71002 is a software vulnerability identified in the flow.column_stack component of OneFlow version 0.9.0, an open-source machine learning framework. The vulnerability arises from a floating-point exception (FPE) triggered by specially crafted input data. Floating-point exceptions typically occur when invalid arithmetic operations are performed, such as division by zero or overflow, leading to abnormal termination or crashes. In this case, an attacker can exploit this flaw by submitting maliciously constructed input to the column_stack function, causing the process to crash or hang, resulting in a Denial of Service (DoS). This disrupts the availability of services relying on OneFlow for data processing or AI workloads. The vulnerability does not require prior authentication, making it accessible to remote attackers who can interact with the vulnerable component. No patches or fixes have been published at the time of this report, and no CVSS score has been assigned. The absence of known exploits in the wild suggests limited current exploitation but does not preclude future attacks. The vulnerability primarily affects availability, with no direct impact on confidentiality or integrity. The scope is limited to systems running the affected OneFlow version, particularly those exposing the vulnerable function to untrusted input. Given the critical role of OneFlow in AI and data processing pipelines, successful exploitation could disrupt business operations and research activities.

Potential Impact

For European organizations, the primary impact of CVE-2025-71002 is the potential disruption of AI and data processing services that rely on OneFlow v0.9.0. This can lead to downtime, loss of productivity, and interruption of critical machine learning workflows. Industries such as finance, healthcare, automotive, and research institutions that utilize AI frameworks may experience operational setbacks. The DoS condition could also affect cloud service providers and managed service environments hosting OneFlow-based applications, potentially impacting multiple customers. Although no data breach or integrity compromise is indicated, the availability impact can have cascading effects on dependent systems and services. Organizations with automated AI pipelines or real-time data analytics may face significant challenges if the vulnerability is exploited. Additionally, the lack of a patch increases the risk window until a fix is released and applied. The threat is more pronounced in environments where OneFlow is exposed to external or untrusted inputs without adequate filtering or validation.

Mitigation Recommendations

To mitigate CVE-2025-71002, organizations should first identify all instances of OneFlow v0.9.0 in their environments, especially those exposed to external inputs. Implement strict input validation and sanitization to prevent malformed data from reaching the flow.column_stack function. Employ runtime monitoring and alerting to detect abnormal crashes or service interruptions indicative of exploitation attempts. Where possible, isolate OneFlow workloads in sandboxed or containerized environments to limit the impact of a DoS event. Engage with the OneFlow development community or vendor to obtain patches or updates as soon as they become available and prioritize their deployment. Consider implementing rate limiting or access controls on interfaces that accept input to OneFlow components to reduce exposure. Additionally, maintain regular backups and ensure robust incident response plans are in place to recover quickly from potential service disruptions. Finally, review and update security policies to include monitoring for this specific vulnerability and educate relevant teams about the risk and detection methods.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 697a653b4623b1157cea4ef2

Added to database: 1/28/2026, 7:36:27 PM

Last enriched: 1/28/2026, 7:50:15 PM

Last updated: 1/28/2026, 8:51:15 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats