CVE-2024-12029

CRITICAL
2025-03-20 [email protected]
9.8
CVSS 3.0
Share

CVSS Vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Patch Released
Mar 31, 2026 - 21:13 nvd
Patch available
Analysis Generated
Mar 28, 2026 - 18:32 vuln.today
CVE Published
Mar 20, 2025 - 10:15 nvd
CRITICAL 9.8

Description

A remote code execution vulnerability exists in invoke-ai/invokeai versions 5.3.1 through 5.4.2 via the /api/v2/models/install API. The vulnerability arises from unsafe deserialization of model files using torch.load without proper validation. Attackers can exploit this by embedding malicious code in model files, which is executed upon loading. This issue is fixed in version 5.4.3.

Analysis

InvokeAI image generation platform versions 5.3.1 through 5.4.2 contain a remote code execution vulnerability via unsafe deserialization when loading AI models. Attackers can embed malicious code in model files that execute when loaded through the /api/v2/models/install API endpoint.

Technical Context

InvokeAI uses torch.load() to deserialize model files without safety restrictions. An attacker can craft a malicious model file with embedded Python code in the pickle stream that executes during deserialization. The /api/v2/models/install API endpoint triggers the model loading, executing the payload on the server.

Affected Products

['InvokeAI 5.3.1 through 5.4.2']

Remediation

Update InvokeAI beyond 5.4.2. Only load models from trusted sources. Use torch.load with weights_only=True when available. Run InvokeAI in a sandboxed environment with restricted network access.

Priority Score

98
Low Medium High Critical
KEV: 0
EPSS: +49.1
CVSS: +49
POC: 0

Share

CVE-2024-12029 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy