CVE-2025-3162: LMDeploy Improper Input Validation Vulnerability
5.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.05471%
CWE
Published
4/3/2025
Updated
4/4/2025
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
lmdeploy | pip | <= 0.7.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability is clearly described in multiple sources (GitHub issue, CVE, VulDB) as being in the load_weight_ckpt function in lmdeploy/lmdeploy/vl/model/utils.py. The function's vulnerability stems from its unsafe use of torch.load() without proper input validation or security parameters. This is a direct input processing function that handles checkpoint files, and the exploit demonstration shows how malicious .pt files can trigger arbitrary code execution through this function. Since all sources consistently point to this single function as the vulnerability point, and the exploit path is clearly demonstrated, the confidence in this identification is high.