CVE-2026-25874
LeRobot Unsafe Deserialization Remote Code Execution via gRPC
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
LeRobot through 0.5.1 contains an unsafe deserialization vulnerability in the async inference pipeline where pickle.loads() is used to deserialize data received over unauthenticated gRPC channels without TLS in the policy server and robot client components. An unauthenticated network-reachable attacker can achieve arbitrary code execution on the server or client by sending a crafted pickle payload through the SendPolicyInstructions, SendObservations, or GetActions gRPC calls.
| CWE | CWE-502 |
| Vendor | hugging face |
| Product | lerobot |
| Published | Apr 23, 2026 |
| Last Updated | Apr 23, 2026 |
Stay Ahead of the Next One
Get instant alerts for hugging face lerobot
Be the first to know when new unknown vulnerabilities affecting hugging face lerobot are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Hugging Face / LeRobot
0 โค 0.5.1
References
chocapikk.com: https://chocapikk.com/posts/2026/lerobot-pickle-rce/ github.com: https://github.com/huggingface/lerobot/issues/3047 github.com: https://github.com/huggingface/lerobot/pull/3048 github.com: https://github.com/huggingface/lerobot/issues/3134 vulncheck.com: https://www.vulncheck.com/advisories/lerobot-unsafe-deserialization-remote-code-execution-via-grpc
Credits
Valentin Lobstein (Chocapikk)