Description
MLX is an array framework for machine learning on Apple silicon. Prior to version 0.29.4, there is a heap buffer overflow in mlx::core::load() when parsing malicious NumPy .npy files. Attacker-controlled file causes 13-byte out-of-bounds read, leading to crash or information disclosure. This issue has been patched in version 0.29.4.
References (3)
Core 3
Core References
Exploit, Vendor Advisory x_refsource_confirm
https://github.com/ml-explore/mlx/security/advisories/GHSA-w6vg-jg77-2qg6
Issue Tracking, Patch x_refsource_misc
https://github.com/ml-explore/mlx/pull/1
Issue Tracking, Patch x_refsource_misc
https://github.com/ml-explore/mlx/pull/2
Scores
CVSS v3
9.1
EPSS
0.0009
EPSS Percentile
25.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-122
Status
published
Products (2)
ml-explore/mlx
< 0.29.4
pypi/mlx
0 - 0.29.4PyPI
Published
Nov 21, 2025
Tracked Since
Feb 18, 2026