Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Flaw in Hugging Face LeRobot Exposes Security Risks

Critical Flaw in Hugging Face LeRobot Exposes Security Risks

Posted on April 28, 2026 By CWS

Cybersecurity experts have revealed a significant security vulnerability within Hugging Face’s open-source robotics platform, LeRobot. This flaw, identified as CVE-2026-25874, holds a critical CVSS rating of 9.3 and opens the door to remote code execution by exploiting untrusted data deserialization.

Understanding the Security Vulnerability

The vulnerability is linked to LeRobot’s async inference pipeline, where the unsafe pickle format is used to deserialize data via unauthenticated gRPC channels. The GitHub advisory highlights that an attacker can send a crafted pickle payload through specific gRPC calls, such as SendPolicyInstructions, leading to arbitrary code execution on the server or client.

Resecurity has pinpointed the issue to the PolicyServer component, noting that an attacker with network access to the PolicyServer port can execute malicious commands on the host machine. The flaw is particularly dangerous as it affects AI inference systems, which often have elevated privileges and access to sensitive internal networks.

Potential Impact and Risks

The exploitation of this flaw could have several severe consequences. Unauthenticated attackers could achieve remote code execution, leading to a full compromise of the PolicyServer host. They could also impact connected robots, steal sensitive data, and perform lateral network movements. Additionally, attackers could disrupt services and corrupt models, posing physical safety risks.

Security researcher Valentin Lobstein, who published further details about the flaw, confirmed its presence in LeRobot version 0.4.3. A fix is expected in version 0.6.0, but it remains unpatched for now. Another researcher, known as “chenpinji,” independently reported the flaw late last year, prompting Hugging Face to acknowledge the need for a significant codebase refactor.

Future Security Measures and Community Involvement

Steven Palma, the tech lead of the LeRobot project, acknowledged the historical focus on research over security. As LeRobot transitions into production use, security is becoming a greater priority. The open-source nature of the project allows the community to actively participate in identifying and rectifying vulnerabilities.

The disclosure underscores the ongoing risks associated with the pickle format, notorious for enabling arbitrary code execution when handling attacker-controlled inputs. Lobstein humorously noted the irony that Hugging Face, which developed Safetensors to avoid such risks, still uses pickle in parts of their robotics framework.

As this vulnerability highlights, open-source projects must remain vigilant about security, especially when leveraging potentially unsafe serialization methods.

The Hacker News Tags:CVE-2026-25874, Cybersecurity, data deserialization, Hugging Face, LeRobot, network security, open source security, pickle format, remote code execution, Resecurity, security flaw, Valentin Lobstein, Vulnerability

Post navigation

Previous Post: Microsoft Unveils Advanced Copilot for Outlook Management
Next Post: Sevii Introduces Predictable AI Defense Costs

Related Posts

Salesloft Takes Drift Offline After OAuth Token Theft Hits Hundreds of Organizations Salesloft Takes Drift Offline After OAuth Token Theft Hits Hundreds of Organizations The Hacker News
Malware Injected into 6 npm Packages After Maintainer Tokens Stolen in Phishing Attack Malware Injected into 6 npm Packages After Maintainer Tokens Stolen in Phishing Attack The Hacker News
Chrome Zero-Day Exploited to Deliver Italian Memento Labs’ LeetAgent Spyware Chrome Zero-Day Exploited to Deliver Italian Memento Labs’ LeetAgent Spyware The Hacker News
CISA Highlights New Vulnerabilities, Sets Federal Deadlines CISA Highlights New Vulnerabilities, Sets Federal Deadlines The Hacker News
Google Uncovers PROMPTFLUX Malware That Uses Gemini AI to Rewrite Its Code Hourly Google Uncovers PROMPTFLUX Malware That Uses Gemini AI to Rewrite Its Code Hourly The Hacker News
How To Browse Faster and Get More Done Using Adapt Browser How To Browse Faster and Get More Done Using Adapt Browser The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • GlassWorm Malware Tied to Over 70 Open VSX Clones
  • Zero Trust Data Movement: The Overlooked Challenge
  • Chinese Hacker Linked to Cyber Espionage Extradited to U.S.
  • Sevii Introduces Predictable AI Defense Costs
  • Critical Flaw in Hugging Face LeRobot Exposes Security Risks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • GlassWorm Malware Tied to Over 70 Open VSX Clones
  • Zero Trust Data Movement: The Overlooked Challenge
  • Chinese Hacker Linked to Cyber Espionage Extradited to U.S.
  • Sevii Introduces Predictable AI Defense Costs
  • Critical Flaw in Hugging Face LeRobot Exposes Security Risks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark