CVE-2026-25873 PUBLISHED

OmniGen2-RL Reward Server Unsafe Deserialization RCE

Assigner: VulnCheck
Reserved: 06.02.2026 Published: 18.03.2026 Updated: 19.03.2026

OmniGen2-RL contains an unauthenticated remote code execution vulnerability in the reward server component that allows remote attackers to execute arbitrary commands by sending malicious HTTP POST requests. Attackers can exploit insecure pickle deserialization of request bodies to achieve code execution on the host system running the exposed service.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 9.3

Product Status

Vendor Beijing Academy of Artificial Intelligence (BAAI)
Product OmniGen2-RL
Versions Default: unknown
  • Version 0 is affected

Credits

  • Valentin Lobstein (Chocapikk) finder

References

Problem Types

  • CWE-502 Deserialization of Untrusted Data CWE