Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25873: CWE-502 Deserialization of Untrusted Data in Beijing Academy of Artificial Intelligence (BAAI) OmniGen2-RL

0
Critical
VulnerabilityCVE-2026-25873cvecve-2026-25873cwe-502
Published: Wed Mar 18 2026 (03/18/2026, 20:47:40 UTC)
Source: CVE Database V5
Vendor/Project: Beijing Academy of Artificial Intelligence (BAAI)
Product: OmniGen2-RL

Description

CVE-2026-25873 is a critical unauthenticated remote code execution vulnerability in the reward server component of Beijing Academy of Artificial Intelligence's OmniGen2-RL product. The flaw arises from insecure deserialization of untrusted data using Python's pickle module in HTTP POST request bodies. Attackers can exploit this to execute arbitrary commands on the host system without any authentication or user interaction. The vulnerability has a CVSS 4. 0 base score of 9. 3, reflecting its high impact on confidentiality, integrity, and availability. No known exploits are currently observed in the wild, but the ease of exploitation and severity make it a significant threat. Organizations using OmniGen2-RL, especially in AI research and development, must prioritize patching or mitigating this issue. Countries with strong AI sectors and deployments of BAAI products are at higher risk. Immediate mitigation includes restricting network exposure of the reward server, implementing input validation, and employing deserialization safeguards.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 01:12:02 UTC

Technical Analysis

CVE-2026-25873 is a critical security vulnerability identified in the OmniGen2-RL product developed by the Beijing Academy of Artificial Intelligence (BAAI). The vulnerability is classified under CWE-502, which pertains to the deserialization of untrusted data. Specifically, the reward server component of OmniGen2-RL improperly handles incoming HTTP POST requests by deserializing their bodies using Python's pickle module without sufficient validation or authentication. Since pickle deserialization can execute arbitrary code embedded in the serialized data, an attacker can craft malicious payloads that, when deserialized by the server, lead to remote code execution (RCE) on the host system. This attack vector requires no authentication or user interaction, making it highly exploitable. The vulnerability affects version 0 of OmniGen2-RL and was published on March 18, 2026. The CVSS 4.0 score of 9.3 indicates a critical severity level, with network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the nature of AI infrastructure and the potential for attackers to gain full control over affected systems. The lack of available patches at the time of disclosure further elevates the urgency for mitigation. This vulnerability highlights the risks associated with insecure deserialization in AI platforms, especially those exposing network-facing services that process serialized data without strict validation or sandboxing.

Potential Impact

The impact of CVE-2026-25873 is severe for organizations utilizing the OmniGen2-RL AI platform. Successful exploitation allows attackers to execute arbitrary commands remotely on the reward server host, potentially leading to full system compromise. This can result in unauthorized access to sensitive AI models, training data, and intellectual property, undermining confidentiality. Attackers could alter or corrupt AI training processes, affecting data integrity and model reliability. Availability may also be disrupted if attackers deploy ransomware, delete critical files, or cause system crashes. Given the unauthenticated nature of the vulnerability, any exposed instance of the reward server is at immediate risk from automated scanning and exploitation attempts. The compromise of AI infrastructure can have cascading effects, including disruption of AI-driven services, loss of competitive advantage, and regulatory compliance violations. Organizations in research, defense, finance, or healthcare sectors leveraging OmniGen2-RL could face significant operational and reputational damage. The absence of known exploits in the wild currently provides a window for proactive defense, but the ease of exploitation and critical severity demand urgent attention.

Mitigation Recommendations

To mitigate CVE-2026-25873, organizations should immediately restrict network access to the OmniGen2-RL reward server, ideally isolating it within trusted internal networks or behind strict firewalls to prevent exposure to untrusted sources. Implement network-level filtering to block unauthorized HTTP POST requests targeting the vulnerable endpoint. Since no official patches are currently available, consider disabling or removing the reward server component if feasible until a fix is released. Employ application-layer input validation to detect and reject suspicious serialized payloads. Where possible, replace insecure pickle deserialization with safer alternatives such as JSON or other serialization formats that do not allow code execution. Use deserialization libraries that enforce strict type whitelisting or sandbox deserialization processes to limit execution scope. Monitor logs and network traffic for anomalous requests indicative of exploitation attempts. Establish an incident response plan specific to AI infrastructure compromise. Stay updated with BAAI advisories for patches or mitigations. Finally, conduct security reviews of AI platform components to identify and remediate similar deserialization risks proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-02-06T19:12:03.464Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bb11f2771bdb1749c4fa31

Added to database: 3/18/2026, 8:58:26 PM

Last enriched: 3/26/2026, 1:12:02 AM

Last updated: 5/2/2026, 4:11:49 AM

Views: 90

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses