
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability (GHSA-7c78-rm87-5673) affects the ms-swift package versions up to 3.6.3. It is a Remote Code Execution (RCE) vulnerability in the web-ui component that allows attackers to execute arbitrary commands through parameter injection. The vulnerability was discovered by TencentAISec and disclosed on July 31, 2025 (GitHub Advisory).
The vulnerability exists in the LLM Training interface of the web-ui component. When users input parameters like Model ID and Dataset Code, the --outputdir parameter can be manipulated through packet capture. The application concatenates these parameters directly with commands without proper sanitization in the swift.ui.llmtrain.llm_train.LLMTrain#train() method. The vulnerability is rated as Moderate severity with a CVSS score of 5.1 (GitHub Advisory).
If exploited, this vulnerability allows attackers to execute arbitrary commands on the target system through command injection in the --output_dir parameter. The impact includes potential system compromise with the privileges of the application process (GitHub Advisory).
The recommended fix involves modifying the swift.ui.llmtrain.llmtrain.LLMTrain#train() method to prevent direct command concatenation and changing the swift.ui.llmtrain.llmtrain.LLMTrain#train_local() method to use subprocess.run([cmd, arg1, arg2...]) instead of os.system for command execution. Users should upgrade to version 3.7 or later which contains the security fix (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."