Platform
python
Component
nvidia/megatron-lm
Fixed in
0.13.2
CVE-2025-23353 describes an injection vulnerability discovered in NVIDIA Megatron-LM, a framework for large language model training. This flaw allows attackers to inject malicious data through the msdp preprocessing script, potentially leading to severe consequences. Versions of Megatron-LM prior to 0.13.1 and 0.12.3 are affected. A fix is available in version 0.13.1.
The vulnerability lies within the msdp preprocessing script, where insufficient input validation allows attackers to inject malicious data. Successful exploitation could result in arbitrary code execution on the affected system, granting the attacker complete control. This could lead to privilege escalation, allowing the attacker to gain higher-level access. Furthermore, the vulnerability poses a significant risk of data disclosure, as sensitive information processed by Megatron-LM could be exposed. Data tampering is also a possibility, enabling attackers to modify training data or model outputs, potentially compromising the integrity of the entire system. The impact is particularly severe in environments where Megatron-LM is used for critical applications or processes.
CVE-2025-23353 was publicly disclosed on 2025-09-24. Currently, there are no known public proof-of-concept exploits available. The EPSS score is pending evaluation. It is not listed on the CISA KEV catalog at the time of this writing. Given the potential for code execution and privilege escalation, this vulnerability warrants careful attention and prompt remediation.
Exploit Status
EPSS
0.02% (6% percentile)
CISA SSVC
CVSS Vector
The primary mitigation for CVE-2025-23353 is to upgrade to NVIDIA Megatron-LM version 0.13.1 or later. This version includes the necessary fixes to prevent malicious data injection. If an immediate upgrade is not feasible due to compatibility issues or system downtime constraints, consider implementing stricter input validation on the msdp preprocessing script to sanitize user-provided data. While not a complete solution, this can reduce the attack surface. Monitoring the msdp script for unusual activity or unexpected data patterns can also help detect potential exploitation attempts. After upgrading, verify the fix by attempting to inject malicious data into the msdp script and confirming that it is properly sanitized.
Actualice Megatron-LM a la versión 0.13.1 o posterior. Esto corregirá la vulnerabilidad de inyección en el script de preprocesamiento msdp. Asegúrese de verificar la integridad de la nueva versión después de la actualización.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2025-23353 is a HIGH severity injection vulnerability affecting NVIDIA Megatron-LM versions before 0.13.1 and 0.12.3, allowing malicious data to trigger code execution and data compromise.
You are affected if you are using NVIDIA Megatron-LM versions prior to 0.13.1 or 0.12.3. Check your installed version and upgrade if necessary.
Upgrade to NVIDIA Megatron-LM version 0.13.1 or later to resolve the vulnerability. Implement input validation as a temporary workaround if immediate upgrade is not possible.
Currently, there are no known active exploits or public proof-of-concept code for CVE-2025-23353, but the potential for exploitation is high.
Refer to the NVIDIA security bulletin for detailed information and updates regarding CVE-2025-23353: [https://nvidia.github.io/security-bulletins/](https://nvidia.github.io/security-bulletins/)
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.
Upload your requirements.txt file and we'll tell you instantly if you're affected.