๐Ÿ” CVE Alert

CVE-2026-7482

CRITICAL 9.1

Ollama heap out-of-bounds read in GGUF tensor parsing leaks server process memory to unauthenticated remote attackers

CVSS Score
9.1
EPSS Score
0.0%
EPSS Percentile
0th

Ollama before 0.17.1 contains a heap out-of-bounds read vulnerability in the GGUF model loader. The /api/create endpoint accepts an attacker-supplied GGUF file in which the declared tensor offset and size exceed the file's actual length; during quantization in fs/ggml/gguf.go and server/quantization.go (WriteTo()), the server reads past the allocated heap buffer. The leaked memory contents may include environment variables, API keys, system prompts, and concurrent users' conversation data, and can be exfiltrated by uploading the resulting model artifact through the /api/push endpoint to an attacker-controlled registry. The /api/create and /api/push endpoints have no authentication in the upstream distribution. Default deployments bind to 127.0.0.1, but the documented OLLAMA_HOST=0.0.0.0 configuration is widely used in practice (large public-internet exposure observed).

CWE CWE-125
Vendor ollama
Product ollama
Published May 4, 2026
Last Updated May 4, 2026
Stay Ahead of the Next One

Get instant alerts for ollama ollama

Be the first to know when new critical vulnerabilities affecting ollama ollama are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
High

Affected Versions

ollama / ollama
0 < 0.17.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/ollama/ollama/pull/14406 github.com: https://github.com/ollama/ollama/commit/88d57d0483cca907e0b23a968c83627a20b21047 github.com: https://github.com/ollama/ollama/releases/tag/v0.17.1

Credits

Cyera Research Team (Dor Attias, Ofek Itach)