CVE-2025-23298: Merlin Transformers4Rec: code injection via Python dep
HIGHTeams running NVIDIA Merlin Transformers4Rec-based recommendation pipelines must patch immediately — a low-privileged attacker on the same system can achieve full code execution, privilege escalation, and data tampering through a vulnerable Python dependency. Shared ML training clusters, JupyterHub environments, and MLOps platforms are highest risk. Apply the NVIDIA advisory fix and audit your Python dependency trees.
Risk Assessment
High risk (CVSS 7.8) in multi-user ML environments. The local attack vector limits direct internet-facing exposure, but shared GPU training clusters, containerized ML workloads, and multi-tenant AI platforms where multiple users execute jobs on common infrastructure are directly exploitable. AC:L with no user interaction means exploitation is straightforward once local access is obtained. The full C:H/I:H/A:H triad means a successful attack results in complete node compromise — training data exfiltration, model weight theft, and supply chain poisoning of downstream model artifacts are all realistic outcomes.
Severity & Risk
Attack Surface
Recommended Action
7 steps-
Identify all Transformers4Rec deployments across training, serving, and CI/CD environments — check installed versions against the patched release noted in NVIDIA advisory a_id/5683.
-
Update the affected Python dependency as directed; rebuild and redeploy any containers built on vulnerable base environments.
-
Enforce least-privilege on ML workloads — training jobs should run as unprivileged users with no unnecessary OS capabilities or mounts.
-
Audit Python dependency trees using pip-audit, Safety, or SBOM tooling across ML containers.
-
Add detection for anomalous child process spawning from Python ML processes in your EDR/SIEM.
-
Isolate ML training environments in separate Kubernetes namespaces or containers with restricted seccomp/AppArmor profiles.
-
Rotate credentials for any service accounts accessible from affected training environments as a precaution.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2025-23298?
Teams running NVIDIA Merlin Transformers4Rec-based recommendation pipelines must patch immediately — a low-privileged attacker on the same system can achieve full code execution, privilege escalation, and data tampering through a vulnerable Python dependency. Shared ML training clusters, JupyterHub environments, and MLOps platforms are highest risk. Apply the NVIDIA advisory fix and audit your Python dependency trees.
Is CVE-2025-23298 actively exploited?
No confirmed active exploitation of CVE-2025-23298 has been reported, but organizations should still patch proactively.
How to fix CVE-2025-23298?
1. Identify all Transformers4Rec deployments across training, serving, and CI/CD environments — check installed versions against the patched release noted in NVIDIA advisory a_id/5683. 2. Update the affected Python dependency as directed; rebuild and redeploy any containers built on vulnerable base environments. 3. Enforce least-privilege on ML workloads — training jobs should run as unprivileged users with no unnecessary OS capabilities or mounts. 4. Audit Python dependency trees using pip-audit, Safety, or SBOM tooling across ML containers. 5. Add detection for anomalous child process spawning from Python ML processes in your EDR/SIEM. 6. Isolate ML training environments in separate Kubernetes namespaces or containers with restricted seccomp/AppArmor profiles. 7. Rotate credentials for any service accounts accessible from affected training environments as a precaution.
What systems are affected by CVE-2025-23298?
This vulnerability affects the following AI/ML architecture patterns: training pipelines, recommendation system serving, data preprocessing pipelines, shared ML compute clusters, MLOps platforms.
What is the CVSS score for CVE-2025-23298?
CVE-2025-23298 has a CVSS v3.1 base score of 7.8 (HIGH). The EPSS exploitation probability is 0.03%.
Technical Details
NVD Description
NVIDIA Merlin Transformers4Rec for all platforms contains a vulnerability in a python dependency, where an attacker could cause a code injection issue. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.
Exploitation Scenario
An attacker obtains low-privileged access to a shared GPU training server — via compromised data scientist credentials, a malicious notebook uploaded to JupyterHub, or a rogue container in an MLOps pipeline. They confirm Transformers4Rec is installed on the target. By crafting a malicious input or configuration artifact processed by the vulnerable Python dependency during data preprocessing or model training, they trigger the CWE-94 code injection. The injected code executes in the context of the training process, allowing privilege escalation to access model weights, proprietary training datasets, or adjacent services. In a worst case, the attacker tampers with training data mid-run to introduce a backdoor into the recommendation model, which then propagates silently to production serving.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H References
Timeline
Related Vulnerabilities
CVE-2025-59528 10.0 Flowise: Unauthenticated RCE via MCP config injection
Same attack type: Supply Chain CVE-2024-2912 10.0 BentoML: RCE via insecure deserialization (CVSS 10)
Same attack type: Supply Chain CVE-2023-3765 10.0 MLflow: path traversal allows arbitrary file read
Same attack type: Supply Chain CVE-2025-5120 10.0 smolagents: sandbox escape enables unauthenticated RCE
Same attack type: Supply Chain CVE-2026-21858 10.0 n8n: Input Validation flaw enables exploitation
Same attack type: Code Execution
AI Threat Alert