Vulnerability Description
MONAI (Medical Open Network for AI) is an AI toolkit for health care imaging. In versions up to and including 1.5.0, in `model_dict = torch.load(full_path, map_location=torch.device(device), weights_only=True)` in monai/bundle/scripts.py , `weights_only=True` is loaded securely. However, insecure loading methods still exist elsewhere in the project, such as when loading checkpoints. This is a common practice when users want to reduce training time and costs by loading pre-trained models downloaded from other platforms. Loading a checkpoint containing malicious content can trigger a deserialization vulnerability, leading to code execution. As of time of publication, no known fixed versions are available.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Monai | Medical Open Network For Ai | <= 1.5.0 |
Related Weaknesses (CWE)
References
- https://github.com/Project-MONAI/MONAI/security/advisories/GHSA-6vm5-6jv9-rjpjExploitVendor Advisory
FAQ
What is CVE-2025-58756?
CVE-2025-58756 is a vulnerability with a CVSS score of 8.8 (HIGH). MONAI (Medical Open Network for AI) is an AI toolkit for health care imaging. In versions up to and including 1.5.0, in `model_dict = torch.load(full_path, map_location=torch.device(device), weights_o...
How severe is CVE-2025-58756?
CVE-2025-58756 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-58756?
Check the references section above for vendor advisories and patch information. Affected products include: Monai Medical Open Network For Ai.