CVE-2026-31217
概要

The _load_model() function in the neural_magic_training.py script of the optimate project in commit a6d302f912b481c94370811af6b11402f51d377f (2024-07-21) allows arbitrary code execution. When a user supplies a directory path via the --model command-line argument, the function reads a module.py file from that directory and executes its contents directly using Python's exec() function. This design does not validate or sanitize the file's content, allowing an attacker who controls the input directory to execute arbitrary Python code in the context of the process running the script.

公表日 2026年5月13日1:16
登録日 2026年5月13日4:12
最終更新日 2026年5月13日1:16
関連情報、対策とツール
共通脆弱性一覧