CVE-2026-1260
HIGHCVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Description
Invalid memory access in Sentencepiece versions less than 0.2.1 when using a vulnerable model file, which is not created in the normal training procedure.
Analysis
Sentencepiece versions below 0.2.1 are vulnerable to memory corruption when processing specially crafted model files, allowing local authenticated attackers to crash the application or potentially execute arbitrary code. This vulnerability requires a malicious model file that deviates from standard training procedures, affecting AI/ML applications that use vulnerable Sentencepiece libraries. …
Sign in for full analysis, threat intelligence, and remediation guidance.
Remediation
Within 24 hours: Identify all systems and applications using Sentencepiece and document their versions and deployment contexts. Within 7 days: Implement compensating controls by restricting model file sources to trusted, internally-validated datasets and isolating affected services on segmented networks. …
Sign in for detailed remediation steps.
Priority Score
Vendor Status
Share
External POC / Exploit Code
Leaving vuln.today
GHSA-38vq-g6vr-w8wf