CVE-2024-49048: TorchGeo Remote Code Execution Vulnerability
8.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.55058%
CWE
Published
11/12/2024
Updated
1/21/2025
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| torchgeo | pip | >= 0, < 0.6.1 | 0.6.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper code injection via eval() in the model weight API. The GitHub PR #2323 explicitly shows removal of eval() usage in get_weight function to fix security issues. The CVE description and patch notes confirm this was the attack vector. The eval() function in get_weight allowed execution of arbitrary strings passed as weight identifiers, matching CWE-94 (Code Injection) characteristics.