CVE-2026-25874 PUBLISHED

LeRobot Unsafe Deserialization Remote Code Execution via gRPC

Assigner: VulnCheck
Reserved: 06.02.2026 Published: 23.04.2026 Updated: 23.04.2026

LeRobot through 0.5.1 contains an unsafe deserialization vulnerability in the async inference pipeline where pickle.loads() is used to deserialize data received over unauthenticated gRPC channels without TLS in the policy server and robot client components. An unauthenticated network-reachable attacker can achieve arbitrary code execution on the server or client by sending a crafted pickle payload through the SendPolicyInstructions, SendObservations, or GetActions gRPC calls.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 9.3

Product Status

Vendor Hugging Face
Product LeRobot
Versions Default: unknown
  • affected from 0 to 0.5.1 (incl.)

Credits

  • Valentin Lobstein (Chocapikk) finder

References

Problem Types

  • CWE-502 Deserialization of Untrusted Data CWE