CVE-2026-0599

Hugging Face · Text Generation Inference (TGI)

A vulnerability in Hugging Face Text Generation Inference (TGI) version 3 could allow for unauthorized exploitation of the inference engine.

Executive summary

Hugging Face Text Generation Inference version 3 is affected by a High-severity vulnerability that could compromise AI model serving environments.

Vulnerability

This vulnerability affects the TGI server, a popular tool for deploying large language models. With a CVSS score of 7.5, the flaw likely involves improper validation of input prompts or API requests, potentially leading to remote code execution or unauthorized model access.

Business impact

The impact of a successful exploit includes the potential theft of proprietary AI models, unauthorized use of expensive compute resources, and the injection of malicious content into model outputs. The High severity reflects the critical role TGI plays in modern AI infrastructure.

Remediation

Immediate Action: Upgrade Hugging Face TGI to the most recent patched version provided by the vendor.

Proactive Monitoring: Monitor API traffic for unusually long or complex prompts that may be designed to trigger buffer overflows or logic errors in the inference engine.

Compensating Controls: Place the TGI server behind a reverse proxy with robust rate limiting and input filtering to mitigate common web-based attack vectors.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Securing AI inference endpoints is critical for maintaining the integrity of automated services. Organizations using TGI version 3 should apply the primary remediation—updating the software—immediately to protect their AI assets and compute environments.