CVE-2025-13708

Tencent · Tencent Multiple Products

A high-severity vulnerability has been identified in multiple Tencent products, specifically within the NeuralNLP-NeuralClassifier component.

Executive summary

A high-severity vulnerability has been identified in multiple Tencent products, specifically within the NeuralNLP-NeuralClassifier component. This flaw allows an unauthenticated, remote attacker to execute arbitrary code on a vulnerable system by tricking it into processing a malicious data file. Successful exploitation could lead to a complete system compromise, enabling data theft, service disruption, and further attacks on the network.

Vulnerability

The vulnerability exists within the _load_checkpoint function of the Tencent NeuralNLP-NeuralClassifier library. This function is responsible for deserializing saved model data ("checkpoints") to restore a state. The process fails to properly validate the data being deserialized, leading to a "Deserialization of Untrusted Data" flaw. An attacker can craft a malicious checkpoint file containing arbitrary commands and host it or send it to a user, which, when loaded by the vulnerable application, will execute the embedded code with the permissions of the application service.

Business impact

This vulnerability is rated as High severity with a CVSS score of 7.8. A successful exploit grants an attacker Remote Code Execution (RCE) capabilities on the affected server. The potential business impact is significant, including the compromise of sensitive corporate data, theft of intellectual property, installation of malware such as ransomware, and complete disruption of services dependent on the affected application. A compromised system could also be used as a pivot point to launch further attacks against the internal network, escalating the overall risk to the organization.

Remediation

Immediate Action: The primary remediation is to apply the security patches released by Tencent immediately. Priority should be given to all internet-facing systems or any system that processes data from untrusted sources. After patching, review access and application logs for any signs of compromise preceding the update.

Proactive Monitoring: Implement enhanced monitoring on affected systems. Security teams should look for:

  • Logs: Any logs showing errors or unusual activity related to the _load_checkpoint function or the loading of model files. Monitor for suspicious file uploads.
  • Network Traffic: Monitor for unexpected outbound connections from affected servers, which could indicate a command-and-control channel established by an attacker.
  • System Behavior: Watch for unexpected processes spawned by the application, unusual file modifications, or high CPU usage that could indicate malicious code execution.

Compensating Controls: If immediate patching is not feasible, implement the following controls to reduce risk:

  • Restrict file upload functionality to trusted users and sources only.
  • Implement strict input validation on any files intended to be processed by the application.
  • Run the application in a sandboxed or containerized environment with minimal privileges to limit the impact of a potential compromise.
  • Use a Web Application Firewall (WAF) with rules designed to detect and block serialized object payloads.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high-severity rating and the risk of complete system compromise, this vulnerability requires immediate attention. Organizations are strongly advised to prioritize the deployment of vendor-supplied patches to all affected systems, starting with those exposed to the internet. While this CVE is not yet on the CISA KEV list, its potential for RCE makes it an attractive target for attackers. While patching is underway, implement the recommended proactive monitoring and compensating controls to reduce the window of opportunity for exploitation.