CVE-2025-50460 – Apache Ms-Swift Remote Code Execution (RCE)

The following table lists the changes that have been made to the
CVE-2025-50460 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Aug. 01, 2025

    Action Type Old Value New Value
    Added Description A remote code execution (RCE) vulnerability exists in the ms-swift project version 3.3.0 due to unsafe deserialization in tests/run.py using yaml.load() from the PyYAML library (versions = 5.3.1). If an attacker can control the content of the YAML configuration file passed to the –run_config parameter, arbitrary code can be executed during deserialization. This can lead to full system compromise. The vulnerability is triggered when a malicious YAML file is loaded, allowing the execution of arbitrary Python commands such as os.system(). It is recommended to upgrade PyYAML to version 5.4 or higher, and to use yaml.safe_load() to mitigate the issue.
    Added Reference https://github.com/advisories/GHSA-6757-jp84-gxfx
    Added Reference https://github.com/Anchor0221/CVE-2025-50460
    Added Reference https://github.com/modelscope/ms-swift
    Added Reference https://github.com/modelscope/ms-swift/blob/main/tests/run.py#L420
Share the Post:

Related Posts