๐Ÿ” CVE Alert

CVE-2026-24747

HIGH 8.8

PyTorch Vulnerable to Remote Code Execution via Untrusted Checkpoint Files

CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
0th

PyTorch is a Python package that provides tensor computation. Prior to version 2.10.0, a vulnerability in PyTorch's `weights_only` unpickler allows an attacker to craft a malicious checkpoint file (`.pth`) that, when loaded with `torch.load(..., weights_only=True)`, can corrupt memory and potentially lead to arbitrary code execution. Version 2.10.0 fixes the issue.

CWE CWE-502 CWE-94
Vendor pytorch
Product pytorch
Published Jan 27, 2026
Last Updated Feb 26, 2026
Stay Ahead of the Next One

Get instant alerts for pytorch pytorch

Be the first to know when new high vulnerabilities affecting pytorch pytorch are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

pytorch / pytorch
< 2.10.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/pytorch/pytorch/security/advisories/GHSA-63cw-57p8-fm3p github.com: https://github.com/pytorch/pytorch/issues/163105 github.com: https://github.com/pytorch/pytorch/163122/commit/954dc5183ee9205cbe79876ad05dd2d9ae752139 github.com: https://github.com/pytorch/pytorch/releases/tag/v2.10.0