Home

Description

Tencent NeuralNLP-NeuralClassifier _load_checkpoint Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tencent NeuralNLP-NeuralClassifier. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the _load_checkpoint function. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-27184.

PUBLISHED Reserved 2025-11-25 | Published 2025-12-23 | Updated 2025-12-30 | Assigner zdi




HIGH: 7.8CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Problem types

CWE-502: Deserialization of Untrusted Data

Product status

Default status
unknown

Current
affected

References

www.zerodayinitiative.com/advisories/ZDI-25-1033/ (ZDI-25-1033)

github.com/...ommit/8dea5ffdb45cf0a33b3d116de38507afaee87594 (vendor-provided URL) vendor-advisory

cve.org (CVE-2025-13708)

nvd.nist.gov (CVE-2025-13708)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.