Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 13 May 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Tue, 12 May 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Arbitrary Code Execution via Unvalidated Exec in Optimate's load_model Function | |
| Weaknesses | CWE-94 |
Tue, 12 May 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The _load_model() function in the neural_magic_training.py script of the optimate project in commit a6d302f912b481c94370811af6b11402f51d377f (2024-07-21) allows arbitrary code execution. When a user supplies a directory path via the --model command-line argument, the function reads a module.py file from that directory and executes its contents directly using Python's exec() function. This design does not validate or sanitize the file's content, allowing an attacker who controls the input directory to execute arbitrary Python code in the context of the process running the script. | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-13T14:01:54.734Z
Reserved: 2026-03-09T00:00:00.000Z
Link: CVE-2026-31217
Updated: 2026-05-13T14:01:47.108Z
Status : Awaiting Analysis
Published: 2026-05-12T16:16:13.600
Modified: 2026-05-13T15:52:25.637
Link: CVE-2026-31217
No data.
OpenCVE Enrichment
Updated: 2026-05-12T18:00:12Z