Vulnerability Description
A remote code execution (RCE) vulnerability exists in the ms-swift project version 3.3.0 due to unsafe deserialization in tests/run.py using yaml.load() from the PyYAML library (versions = 5.3.1). If an attacker can control the content of the YAML configuration file passed to the --run_config parameter, arbitrary code can be executed during deserialization. This can lead to full system compromise. The vulnerability is triggered when a malicious YAML file is loaded, allowing the execution of arbitrary Python commands such as os.system(). It is recommended to upgrade PyYAML to version 5.4 or higher, and to use yaml.safe_load() to mitigate the issue.
CVSS Score
CRITICAL
Related Weaknesses (CWE)
References
- https://github.com/Anchor0221/CVE-2025-50460
- https://github.com/advisories/GHSA-6757-jp84-gxfx
- https://github.com/modelscope/ms-swift
- https://github.com/modelscope/ms-swift/blob/main/tests/run.py#L420
- https://github.com/Anchor0221/CVE-2025-50460
FAQ
What is CVE-2025-50460?
CVE-2025-50460 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A remote code execution (RCE) vulnerability exists in the ms-swift project version 3.3.0 due to unsafe deserialization in tests/run.py using yaml.load() from the PyYAML library (versions = 5.3.1). If ...
How severe is CVE-2025-50460?
CVE-2025-50460 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-50460?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.