Description
OmniGen2-RL contains an unauthenticated remote code execution vulnerability in the reward server component that allows remote attackers to execute arbitrary commands by sending malicious HTTP POST requests. Attackers can exploit insecure pickle deserialization of request bodies to achieve code execution on the host system running the exposed service.
Problem types
CWE-502 Deserialization of Untrusted Data
Product status
Any version
Credits
Valentin Lobstein (Chocapikk)
References
github.com/VectorSpaceLab/OmniGen2/pull/139
chocapikk.com/posts/2026/omnigen2-pickle-rce/
arxiv.org/abs/2506.18871
github.com/...5c5/OmniGen2-RL/reward_server/reward_server.py
github.com/...15c5/OmniGen2-RL/reward_server/reward_proxy.py
github.com/...15c5/OmniGen2-RL/reward_server/reward_proxy.py
www.vulncheck.com/...eward-server-unsafe-deserialization-rce