Home

Description

The mamba language model framework thru 2.2.6 is vulnerable to insecure deserialization (CWE-502) when loading pre-trained models from HuggingFace Hub. The MambaLMHeadModel.from_pretrained() method uses torch.load() to load the pytorch_model.bin weight file without enabling the security-restrictive weights_only=True parameter. This allows the deserialization of arbitrary Python objects via the pickle module. An attacker can exploit this by publishing a malicious model repository on HuggingFace Hub. When a victim loads a model from this repository, arbitrary code is executed on the victim's system in the context of the mamba process.

PUBLISHED Reserved 2026-03-09 | Published 2026-05-12 | Updated 2026-05-14 | Assigner mitre

References

github.com/state-spaces/mamba

www.notion.so/...2026-31239-35d1e1393188810d9baedfbd8363f396

cve.org (CVE-2026-31239)

nvd.nist.gov (CVE-2026-31239)

Download JSON