{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-4538","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-03-21T08:13:45.702Z","datePublished":"2026-03-22T04:20:28.356Z","dateUpdated":"2026-03-23T16:21:46.022Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-03-22T04:20:28.356Z"},"title":"PyTorch pt2 Loading deserialization","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-502","lang":"en","description":"Deserialization"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-20","lang":"en","description":"Improper Input Validation"}]}],"affected":[{"vendor":"n/a","product":"PyTorch","versions":[{"version":"2.10.0","status":"affected"}],"modules":["pt2 Loading Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was identified in PyTorch 2.10.0. The affected element is an unknown function of the component pt2 Loading Handler. The manipulation leads to deserialization. The attack can only be performed from a local environment. The exploit is publicly available and might be used. The project was informed of the problem early through a pull request but has not reacted yet."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":4.8,"vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":5.3,"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.3,"vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":4.3,"vectorString":"AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-03-21T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-03-21T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-03-21T09:18:51.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"ez-lbz (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.352326","name":"VDB-352326 | PyTorch pt2 Loading deserialization","tags":["vdb-entry"]},{"url":"https://vuldb.com/?ctiid.352326","name":"VDB-352326 | CTI Indicators (IOB, IOC)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.774681","name":"Submit #774681 | pytorch PyTorch 2.10.0 Release deserialize","tags":["third-party-advisory"]},{"url":"https://github.com/pytorch/pytorch/pull/176791","tags":["exploit","issue-tracking","patch"]},{"url":"https://github.com/pytorch/pytorch/","tags":["product"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-23T16:21:34.173069Z","id":"CVE-2026-4538","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-23T16:21:46.022Z"}}]}}