CVE-2025-50460

CRITICAL

ms-swift 3.3.0 - RCE

Title source: llm

Description

A remote code execution (RCE) vulnerability exists in the ms-swift project version 3.3.0 due to unsafe deserialization in tests/run.py using yaml.load() from the PyYAML library (versions = 5.3.1). If an attacker can control the content of the YAML configuration file passed to the --run_config parameter, arbitrary code can be executed during deserialization. This can lead to full system compromise. The vulnerability is triggered when a malicious YAML file is loaded, allowing the execution of arbitrary Python commands such as os.system(). It is recommended to upgrade PyYAML to version 5.4 or higher, and to use yaml.safe_load() to mitigate the issue.

Exploits (1)

nomisec WRITEUP
by Anchor0221 · poc
https://github.com/Anchor0221/CVE-2025-50460

Scores

CVSS v3 9.8
EPSS 0.0414
EPSS Percentile 88.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-502
Status published
Products (1)
pypi/ms-swift 0PyPI
Published Aug 01, 2025
Tracked Since Feb 18, 2026