Логотип exploitDog
bind:CVE-2025-50460
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-50460

Количество 2

Количество 2

nvd логотип

CVE-2025-50460

6 месяцев назад

A remote code execution (RCE) vulnerability exists in the ms-swift project version 3.3.0 due to unsafe deserialization in tests/run.py using yaml.load() from the PyYAML library (versions = 5.3.1). If an attacker can control the content of the YAML configuration file passed to the --run_config parameter, arbitrary code can be executed during deserialization. This can lead to full system compromise. The vulnerability is triggered when a malicious YAML file is loaded, allowing the execution of arbitrary Python commands such as os.system(). It is recommended to upgrade PyYAML to version 5.4 or higher, and to use yaml.safe_load() to mitigate the issue.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-fm6c-f59h-7mmg

6 месяцев назад

MS SWIFT Remote Code Execution via unsafe PyYAML deserialization

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-50460

A remote code execution (RCE) vulnerability exists in the ms-swift project version 3.3.0 due to unsafe deserialization in tests/run.py using yaml.load() from the PyYAML library (versions = 5.3.1). If an attacker can control the content of the YAML configuration file passed to the --run_config parameter, arbitrary code can be executed during deserialization. This can lead to full system compromise. The vulnerability is triggered when a malicious YAML file is loaded, allowing the execution of arbitrary Python commands such as os.system(). It is recommended to upgrade PyYAML to version 5.4 or higher, and to use yaml.safe_load() to mitigate the issue.

CVSS3: 9.8
2%
Низкий
6 месяцев назад
github логотип
GHSA-fm6c-f59h-7mmg

MS SWIFT Remote Code Execution via unsafe PyYAML deserialization

CVSS3: 9.8
2%
Низкий
6 месяцев назад

Уязвимостей на страницу