Critical Unpatched Flaw Leaves Hugging Face LeRobot Open to Unauthenticated RCE
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得通读整篇文章,抓住主要信息。 文章讲的是LeRobot平台发现了一个严重的安全漏洞,CVE-2026-25874,CVSS评分9.3分。这个漏洞是由于使用了不安全的pickle格式进行反序列化,攻击者可以通过gRPC调用发送恶意payload,实现远程代码执行。影响包括服务器和客户端被控制、数据泄露、网络横向移动等。目前还没有补丁,预计在0.6.0版本修复。 接下来,我需要把这些信息浓缩到100字以内。要突出关键点:漏洞名称、评分、原因、影响和修复情况。 可能的结构是:LeRobot平台存在严重漏洞(CVE-...),CVSS 9.3分,源于不安全的反序列化。攻击者可远程执行代码,导致服务器被控制、数据泄露等。尚未修复,计划在0.6.0版本解决。 这样应该能涵盖主要内容,并且符合字数要求。 </think> LeRobot平台存在严重安全漏洞(CVE-2026-25874),CVSS评分9.3分。该漏洞源于不安全的反序列化机制,攻击者可通过gRPC调用发送恶意payload实现远程代码执行。漏洞影响包括服务器和客户端控制、数据泄露及网络横向移动等。目前尚未修复,计划在0.6.0版本中解决。 2026-4-28 11:18:0 Author: thehackernews.com(查看原文) 阅读量:26 收藏

Vulnerability / Network Security

Cybersecurity researchers have disclosed details of a critical security flaw impacting LeRobot, Hugging Face's open-source robotics platform with nearly 24,000 GitHub stars, that could be exploited to achieve remote code execution.

The vulnerability in question is CVE-2026-25874 (CVSS score: 9.3), which has been described as a case of untrusted data deserialization stemming from the use of the unsafe pickle format.

"LeRobot contains an unsafe deserialization vulnerability in the async inference pipeline, where pickle.loads() is used to deserialize data received over unauthenticated gRPC channels without TLS in the policy server and robot client components," according to a GitHub advisory for the flaw.

"An unauthenticated network-reachable attacker can achieve arbitrary code execution on the server or client by sending a crafted pickle payload through the SendPolicyInstructions, SendObservations, or GetActions gRPC calls."

According to Resecurity, the problem is rooted in the async inference PolicyServer component, allowing an unauthenticated attacker who can reach the PolicyServer network port to send a malicious serialized payload and run arbitrary operating system commands on the host machine running the service.

The cybersecurity company said the vulnerability is "dangerous" as the service is designed for artificial intelligence inference systems, which tend to run with elevated privileges to access internal networks, datasets, and expensive compute resources. Should the flaw be exploited by an attacker, it could enable a wide range of actions, including -

  • Unauthenticated remote code execution
  • Complete compromise of the PolicyServer host
  • Impact connected robots
  • Theft of sensitive data, such as API keys, SSH credentials, and model files
  • Move laterally across the network
  • Crash services, corrupt models, or sabotage operations, leading to physical safety risks

VulnCheck security researcher Valentin Lobstein, who discovered and published additional details of the shortcoming last week, said it has been successfully validated against LeRobot version 0.4.3. The issue currently remains unpatched, with a fix planned in version 0.6.0.

Interestingly, the same flaw was independently reported by another researcher who goes by the online alias "chenpinji" sometime in December 2025. The LeRobot team responded earlier this January, acknowledging the security risk and noting "that part of the codebase needs to be almost entirely refactored as its original implementation was more experimental."

"That said, LeRobot has so far been primarily a research and prototyping tool, which is why deployment security hasn't been a strong focus until now," Steven Palma, tech lead of the project, said. "As LeRobot continues to be adopted and deployed in production, we’ll start paying much closer attention to these kinds of issues. Fortunately, being an open-source project, the community can also help by reporting and fixing vulnerabilities."

The findings once again expose the dangers of using the pickle format, as it paves the way for arbitrary code execution attacks simply by loading a specially crafted file.

"The irony here is hard to overstate," Lobstein noted. "Hugging Face created Safetensors -- a serialization format designed specifically because pickle is dangerous for ML data. And yet their own robotics framework deserializes attacker-controlled network input with pickle.loads(), with # nosec comments to silence the tool that was trying to warn them."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/04/critical-cve-2026-25874-leaves-hugging.html
如有侵权请联系:admin#unsafe.sh