CVE-2026-25873
🟠 Łataj w tym tygodniu
Podatność w OmniGen2-RL umożliwia zdalne wykonanie dowolnego kodu przez atakujących, którzy wysyłają złośliwe żądania HTTP POST.
CVSS
9.8
EPSS
0.1%
Exploit
none
Vendor
Opis źródłowy (NVD)
OmniGen2-RL contains an unauthenticated remote code execution vulnerability in the reward server component that allows remote attackers to execute arbitrary commands by sending malicious HTTP POST requests. Attackers can exploit insecure pickle deserialization of request bodies to achieve code execution on the host system running the exposed service.
deserialization rce
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 9.8 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.1% |
| Opublikowano (NVD) | 2026-03-18 21:16:25 UTC |
| Ostatnia modyfikacja (NVD) | 2026-03-19 13:25:00 UTC |
Referencje
- https://arxiv.org/abs/2506.18871 (disclosure@vulncheck.com)
- https://chocapikk.com/posts/2026/omnigen2-pickle-rce/ (disclosure@vulncheck.com)
- https://github.com/VectorSpaceLab/OmniGen2/blob/3a13017e532f9f309a38bca571fd62200a6415c5/OmniGen2-RL/reward_server/reward_proxy.py#L208 (disclosure@vulncheck.com)
- https://github.com/VectorSpaceLab/OmniGen2/blob/3a13017e532f9f309a38bca571fd62200a6415c5/OmniGen2-RL/reward_server/reward_proxy.py#L224 (disclosure@vulncheck.com)
- https://github.com/VectorSpaceLab/OmniGen2/blob/3a13017e532f9f309a38bca571fd62200a6415c5/OmniGen2-RL/reward_server/reward_server.py#L118 (disclosure@vulncheck.com)
- https://github.com/VectorSpaceLab/OmniGen2/pull/139 (disclosure@vulncheck.com)
- https://www.vulncheck.com/advisories/omnigen2-rl-reward-server-unsafe-deserialization-rce (disclosure@vulncheck.com)