Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. pytorch-lightning
  4. ›
  5. CVE-2026-44484

CVE-2026-44484: Compromise of PyTorch Lightning PyPi Package Versions

May 7, 2026

Security Advisory: Compromise of PyTorch Lightning PyPI Package Versions

Published: 2026-04-30
Last Updated: 2026-04-30

Lightning AI has identified a security incident affecting certain versions of a PyPI package.

What happened

Lightning AI has determined that one or more released versions of this package have been compromised and include malicious code.

The current investigation indicates that the affected versions have introduced functionality consistent with a credential harvesting mechanism. There is a continuing analysis the scope and behaviour of the code.

At this stage, the root cause of the compromise is still under investigation.

What versions are affected

Lightning AI is currently working to confirm the exact set of impacted versions.

The following versions are determined as affected, and developers should delete them from their systems:

  • 2.6.2
  • 2.6.3

Lightning AI will update this advisory if the versions impacted by this vulnerability change.

What you should do immediately

If developers have installed or are running any potentially affected versions on their application:

  • Assume the environment may be compromised
  • Immediately rotate all credentials and secrets that may have been exposed, including:
    • API keys
    • Access tokens
    • SSH keys
    • Service account credentials
  • Rebuild affected systems from a known clean state
  • Pin PyTorch Lightning to version 2.6.1
  • Review logs for any suspicious or unauthorised activity

Actions Lightning AI has taken

  • Quarantined malicious versions from PyPI
  • Recommended using version 2.6.1: https://github.com/Lightning-AI/pytorch-lightning/releases/tag/2.6.1
  • Revoked and rotated all internal credentials associated with our release process
  • Initiated a full investigation into the compromise

Ongoing investigation

Lightning AI is actively working to:

  • Identify the exact mechanism of compromise
  • Confirm the full set of affected versions
  • Determine the behaviour and impact of the malicious code
  • Assess any downstream impact to users

Lightning AI will provide updates as soon as more information becomes available.

Commitment to transparency

Lightning AI takes the security of users and the integrity of the software supply chain extremely seriously.

Lightning AI will continue to share timely and accurate updates as the investigation progresses.

Contact

If there are any questions or if there are concerns that a consuming project may be impacted, please send an email to:

security@lightning.ai

References

  • github.com/Lightning-AI/pytorch-lightning
  • github.com/Lightning-AI/pytorch-lightning/security/advisories/GHSA-w37p-236h-pfx3
  • github.com/advisories/GHSA-w37p-236h-pfx3
  • nvd.nist.gov/vuln/detail/CVE-2026-44484

Code Behaviors & Features

Detect and mitigate CVE-2026-44484 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

Version 2.6.2, version 2.6.3

Solution

Unfortunately, there is no solution available yet.

Impact 9.8 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-506: Embedded Malicious Code

Source file

pypi/pytorch-lightning/CVE-2026-44484.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 00:18:35 +0000.