CVE-2026-24747: PyTorch Vulnerable to Remote Code Execution via Untrusted Checkpoint Files
(updated )
A vulnerability in PyTorch’s weights_only unpickler allows an attacker to craft a malicious checkpoint file (.pth) that, when loaded with torch.load(..., weights_only=True), can corrupt memory and potentially lead to arbitrary code execution.
References
- github.com/advisories/GHSA-63cw-57p8-fm3p
- github.com/pytorch/pytorch
- github.com/pytorch/pytorch/163122/commit/954dc5183ee9205cbe79876ad05dd2d9ae752139
- github.com/pytorch/pytorch/issues/163105
- github.com/pytorch/pytorch/releases/tag/v2.10.0
- github.com/pytorch/pytorch/security/advisories/GHSA-63cw-57p8-fm3p
- nvd.nist.gov/vuln/detail/CVE-2026-24747
Code Behaviors & Features
Detect and mitigate CVE-2026-24747 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →