CVE-2025-14920
Hugging · Hugging Face Transformers library
A high-severity vulnerability has been identified in the Hugging Face Transformers library, specifically affecting the Perceiver Model.
Executive summary
A high-severity vulnerability has been identified in the Hugging Face Transformers library, specifically affecting the Perceiver Model. This flaw allows an unauthenticated, remote attacker to execute arbitrary code on a vulnerable system by tricking it into processing a maliciously crafted data file. Successful exploitation could lead to a complete system compromise, enabling data theft, service disruption, and further network intrusion.
Vulnerability
This vulnerability is a Deserialization of Untrusted Data flaw within the Hugging Face Transformers Perceiver Model component. The vulnerability occurs when the application deserializes data from an untrusted source to load or interact with a model. An attacker can craft a malicious data payload that, when processed by the vulnerable deserialization function, executes arbitrary commands on the underlying server with the permissions of the running application. Exploitation requires an attacker to convince a user or an automated system to load a malicious model file or process specially crafted input data.
Business impact
This vulnerability is rated as High severity with a CVSS score of 7.8. A successful exploit could have a severe impact on the business, leading to a complete compromise of the affected server. Potential consequences include the theft of sensitive data such as proprietary machine learning models, training datasets, or customer information. An attacker could also disrupt critical business operations by disabling the service, use the compromised system as a pivot point to move laterally within the corporate network, or deploy ransomware.
Remediation
Immediate Action: Apply security patches released by the vendor immediately, prioritizing internet-facing systems and critical applications that utilize the affected models. Initiate monitoring for signs of exploitation and conduct a thorough review of access and application logs for anomalous activity consistent with post-exploitation behavior.
Proactive Monitoring: Implement enhanced monitoring on systems running the affected software. Security teams should look for unusual child processes spawned by the application (e.g., sh, bash, powershell.exe), unexpected outbound network connections to unknown IP addresses, and errors or anomalies in application logs related to model deserialization.
Compensating Controls: If immediate patching is not feasible, implement the following controls to reduce risk:
- Run the model-processing application in a sandboxed, containerized, or otherwise isolated environment with minimal privileges and strict egress network filtering.
- Enforce a strict policy to only load models and data from trusted, internally-vetted sources.
- Utilize application control or whitelisting solutions to prevent the execution of unauthorized commands or binaries on the host system.
Exploitation status
Public Exploit Available: false
Analyst recommendation
This vulnerability represents a significant risk to the organization due to its high severity (CVSS 7.8) and the potential for complete system compromise via remote code execution. It is strongly recommended to treat this as a high-priority issue. The immediate application of vendor-supplied patches to all affected systems is the most effective mitigation. While this CVE is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its high impact makes it a prime candidate for future inclusion. Proactive patching is critical to prevent potential exploitation.