PyTorch is a Python package that provides tensor computation. Prior to version 2.10.0, a vulnerability in PyTorch's `weights_only` unpickler allows an attacker to craft a malicious checkpoint file (`.pth`) that, when loaded with `torch.load(..., weights_only=True)`, can corrupt memory and potentially lead to arbitrary code execution. Version 2.10.0 fixes the issue.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-63cw-57p8-fm3p PyTorch Vulnerable to Remote Code Execution via Untrusted Checkpoint Files
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 27 Jan 2026 21:30:00 +0000

Type Values Removed Values Added
Description PyTorch is a Python package that provides tensor computation. Prior to version 2.10.0, a vulnerability in PyTorch's `weights_only` unpickler allows an attacker to craft a malicious checkpoint file (`.pth`) that, when loaded with `torch.load(..., weights_only=True)`, can corrupt memory and potentially lead to arbitrary code execution. Version 2.10.0 fixes the issue.
Title PyTorch Vulnerable to Remote Code Execution via Untrusted Checkpoint Files
Weaknesses CWE-502
CWE-94
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-27T21:13:46.878Z

Reserved: 2026-01-26T19:06:16.059Z

Link: CVE-2026-24747

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-01-27T22:15:56.470

Modified: 2026-01-27T22:15:56.470

Link: CVE-2026-24747

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses