CVE-2025-60455
Python vulnerability analysis and mitigation

Overview

A critical Remote Code Execution (RCE) vulnerability was discovered in Modular Max Serve before version 25.6 (CVE-2025-60455). The vulnerability specifically affects installations where the '--experimental-enable-kvcache-agent' feature is enabled, allowing attackers to execute arbitrary code through unsafe deserialization (Oligo Security, Hacker News).

Technical details

The vulnerability stems from the unsafe implementation of ZeroMQ (ZMQ) communications combined with Python's pickle deserialization in the KV Cache Agent component. The issue was discovered as part of a broader pattern dubbed 'ShadowMQ', where unsafe deserialization patterns were propagated through code reuse across multiple AI frameworks. The vulnerable code was identified in the kvcacheagent.py file, specifically related to the recvpyobj() method which used pickle for deserialization over unauthenticated network sockets (GitHub Commit).

Impact

The vulnerability could allow attackers to execute arbitrary code on affected systems, potentially leading to complete system compromise. As Modular Max Server is used in AI infrastructure processing sensitive data across GPU clusters, successful exploitation could enable attackers to execute malicious code, escalate privileges to other internal systems, exfiltrate model data or secrets, and potentially install GPU-based cryptominers (Oligo Security).

Mitigation and workarounds

The vulnerability has been patched in Modular Max Server version 25.6 by replacing pickle with msgpack for serialization. Organizations are advised to update to the patched version immediately. For those unable to update, it's recommended to avoid using pickle with untrusted data, implement authentication (HMAC or TLS) for ZMQ communications, and restrict network access to ZMQ endpoints (Oligo Security).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-55449CRITICAL9.8
  • PythonPython
  • astrbot
NoYesNov 14, 2025
CVE-2025-65015CRITICAL9.2
  • PythonPython
  • localstack
NoYesNov 18, 2025
CVE-2025-60455HIGH8.4
  • PythonPython
  • modular
NoYesNov 18, 2025
CVE-2025-65073HIGH7.5
  • PythonPython
  • keystone
NoYesNov 17, 2025
CVE-2025-12765HIGH7.4
  • PythonPython
  • cpe:2.3:a:pgadmin:pgadmin
NoYesNov 13, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management