CVE-2023-48299
TorchServe vulnerability analysis and mitigation

Overview

TorchServe, a tool for serving and scaling PyTorch models in production, was found to contain a ZipSlip vulnerability (CVE-2023-48299) affecting versions 0.1.0 to 0.9.0. The vulnerability was discovered in the model/workflow management API, where potentially harmful archives could be uploaded and extracted to any location on the filesystem within process permissions (GitHub Advisory).

Technical details

The vulnerability is classified as a Path Traversal issue (CWE-22) with a CVSS v3.1 base score of 5.3 (Medium). The attack vector is Network-based with low attack complexity, requiring no privileges or user interaction. The scope is unchanged, with no impact on confidentiality, low impact on integrity, and no impact on availability (NVD).

Impact

This vulnerability could allow third-party actors to hide harmful code in open-source/public models that can be downloaded from the internet. When these models are executed on machines running TorchServe, the malicious code could be extracted to arbitrary locations on the filesystem, potentially compromising the system (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been fixed in TorchServe version 0.9.0 by implementing validation of file paths contained within zip archives before extraction. Users are advised to upgrade to version 0.9.0 or later to address this security issue (Release Notes, GitHub Patch).

Community reactions

The vulnerability was responsibly disclosed by Oligo Security, and AWS Security has been involved in handling the security advisory. The fix was implemented through a pull request that received attention from the TorchServe maintainers and was merged after proper review (GitHub PR).

Additional resources


SourceThis report was generated using AI

Related TorchServe vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

GHSA-4mqg-h5jf-j9m7CRITICAL9.9
  • TorchServeTorchServe
  • torchserve
NoYesOct 02, 2023
CVE-2024-35198CRITICAL9.8
  • TorchServeTorchServe
  • torchserve
NoYesJul 19, 2024
CVE-2024-35199HIGH8.2
  • TorchServeTorchServe
  • torchserve
NoYesJul 19, 2024
CVE-2024-6577MEDIUM6.3
  • TorchServeTorchServe
  • torchserve
NoNoMar 20, 2025
CVE-2023-48299MEDIUM5.3
  • TorchServeTorchServe
  • torchserve
NoYesNov 21, 2023

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management