Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Flaw in Hugging Face LeRobot Exposes Security Risks

Critical Flaw in Hugging Face LeRobot Exposes Security Risks

Posted on April 28, 2026 By CWS

Cybersecurity experts have revealed a significant security vulnerability within Hugging Face’s open-source robotics platform, LeRobot. This flaw, identified as CVE-2026-25874, holds a critical CVSS rating of 9.3 and opens the door to remote code execution by exploiting untrusted data deserialization.

Understanding the Security Vulnerability

The vulnerability is linked to LeRobot’s async inference pipeline, where the unsafe pickle format is used to deserialize data via unauthenticated gRPC channels. The GitHub advisory highlights that an attacker can send a crafted pickle payload through specific gRPC calls, such as SendPolicyInstructions, leading to arbitrary code execution on the server or client.

Resecurity has pinpointed the issue to the PolicyServer component, noting that an attacker with network access to the PolicyServer port can execute malicious commands on the host machine. The flaw is particularly dangerous as it affects AI inference systems, which often have elevated privileges and access to sensitive internal networks.

Potential Impact and Risks

The exploitation of this flaw could have several severe consequences. Unauthenticated attackers could achieve remote code execution, leading to a full compromise of the PolicyServer host. They could also impact connected robots, steal sensitive data, and perform lateral network movements. Additionally, attackers could disrupt services and corrupt models, posing physical safety risks.

Security researcher Valentin Lobstein, who published further details about the flaw, confirmed its presence in LeRobot version 0.4.3. A fix is expected in version 0.6.0, but it remains unpatched for now. Another researcher, known as “chenpinji,” independently reported the flaw late last year, prompting Hugging Face to acknowledge the need for a significant codebase refactor.

Future Security Measures and Community Involvement

Steven Palma, the tech lead of the LeRobot project, acknowledged the historical focus on research over security. As LeRobot transitions into production use, security is becoming a greater priority. The open-source nature of the project allows the community to actively participate in identifying and rectifying vulnerabilities.

The disclosure underscores the ongoing risks associated with the pickle format, notorious for enabling arbitrary code execution when handling attacker-controlled inputs. Lobstein humorously noted the irony that Hugging Face, which developed Safetensors to avoid such risks, still uses pickle in parts of their robotics framework.

As this vulnerability highlights, open-source projects must remain vigilant about security, especially when leveraging potentially unsafe serialization methods.

The Hacker News Tags:CVE-2026-25874, Cybersecurity, data deserialization, Hugging Face, LeRobot, network security, open source security, pickle format, remote code execution, Resecurity, security flaw, Valentin Lobstein, Vulnerability

Post navigation

Previous Post: Microsoft Unveils Advanced Copilot for Outlook Management
Next Post: Sevii Introduces Predictable AI Defense Costs

Related Posts

Hackers Target Critical Quest KACE SMA Vulnerability Hackers Target Critical Quest KACE SMA Vulnerability The Hacker News
Russian Hackers Create 4,300 Fake Travel Sites to Steal Hotel Guests’ Payment Data Russian Hackers Create 4,300 Fake Travel Sites to Steal Hotel Guests’ Payment Data The Hacker News
AI Is Already the #1 Data Exfiltration Channel in the Enterprise AI Is Already the #1 Data Exfiltration Channel in the Enterprise The Hacker News
Stealit Malware Abuses Node.js Single Executable Feature via Game and VPN Installers Stealit Malware Abuses Node.js Single Executable Feature via Game and VPN Installers The Hacker News
Now-Patched Fortinet FortiWeb Flaw Exploited in Attacks to Create Admin Accounts Now-Patched Fortinet FortiWeb Flaw Exploited in Attacks to Create Admin Accounts The Hacker News
Nine IP KVM Flaws Risk Unauthorized Root Access Nine IP KVM Flaws Risk Unauthorized Root Access The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Chinese Hacker Extradited to US for Cyberattacks
  • VECT 2.0 Ransomware Permanently Destroys Large Files
  • WhatsApp Develops Built-In Cloud Backup with Encryption
  • GlassWorm Malware Tied to Over 70 Open VSX Clones
  • Zero Trust Data Movement: The Overlooked Challenge

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Chinese Hacker Extradited to US for Cyberattacks
  • VECT 2.0 Ransomware Permanently Destroys Large Files
  • WhatsApp Develops Built-In Cloud Backup with Encryption
  • GlassWorm Malware Tied to Over 70 Open VSX Clones
  • Zero Trust Data Movement: The Overlooked Challenge

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark