
Cloud Vulnerability DB
A community-led vulnerabilities database
A deserialization vulnerability was identified in geyang ml-logger up to commit acf255bade5be6ad88d90735c8367b28cbe3a743. The vulnerability affects the loghandler function in the mllogger/server.py component of the Ping Handler. The issue was discovered and reported on September 11, 2025, and was assigned CVE-2025-10950 (VulDB, GitHub Issue).
The vulnerability stems from unsafe deserialization in the loghandler function within mllogger/server.py. The function uses cloudpickle.loads for deserialization of untrusted input data, which can lead to remote code execution. The vulnerability has received a CVSS v4.0 score of 5.3 (Medium) and CVSS v3.1 score of 6.3 (Medium). The issue has been classified under CWE-20 (Improper Input Validation) and CWE-502 (Deserialization of Untrusted Data) (NVD).
The vulnerability allows remote attackers to execute arbitrary code on both the server and user systems through manipulation of deserialized data. This can lead to complete system compromise and unauthorized access to the affected systems (GitHub Issue).
The recommended mitigation is to avoid using cloudpickle.loads for parsing request and response bodies, and instead implement json.loads for safer data handling. As the product uses a rolling release model, users should update to a version after the identified vulnerable commit (GitHub Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."