Home

Description

A critical remote code execution vulnerability exists in all versions of the HuggingFace transformers library prior to version 5.3.0. The vulnerability allows an attacker to craft a malicious `config.json` file containing the `_attn_implementation_internal` field set to an attacker-controlled HuggingFace Hub repository ID. When a victim loads this model using the standard `AutoModelForCausalLM.from_pretrained()` API, the library downloads and executes arbitrary Python code from the attacker's repository with the victim's full OS privileges. This issue arises due to unfiltered deserialization of configuration attributes, insufficient sanitization of internal fields, and unsandboxed execution of downloaded kernels. The vulnerability bypasses the `trust_remote_code` security mechanism, is invisible to the victim, and exploits the standard documented usage pattern, making it particularly severe. Users are advised to upgrade to version 5.3.0 or later to mitigate this issue.

PUBLISHED Reserved 2026-03-18 | Published 2026-05-24 | Updated 2026-05-24 | Assigner @huntr_ai




HIGH: 7.8CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Problem types

CWE-1066 Missing Serialization Control Element

Product status

Any version before 5.3.0
affected

References

huntr.com/bounties/1f693a6e-6836-4b8b-a0bd-ca036fba8884

github.com/...ommit/a7f8e7ff37d87d1a1a0c8cf607971c607741452f

cve.org (CVE-2026-4372)

nvd.nist.gov (CVE-2026-4372)

Download JSON