VYPR
Critical severityNVD Advisory· Published Jan 20, 2024· Updated May 30, 2025

Code Injection in paddlepaddle/paddle

CVE-2024-0521

Description

Code Injection in paddlepaddle/paddle

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A code injection vulnerability in PaddlePaddle allows attackers to execute arbitrary code via crafted input.

Vulnerability

Overview CVE-2024-0521 is a code injection vulnerability in the PaddlePaddle deep learning framework, as reported in the Huntr bug bounty platform [3]. The vulnerability stems from insufficient input validation, allowing an attacker to inject and execute arbitrary code within the application context.

Exploitation

Exploitation requires the attacker to provide a specially crafted input to a vulnerable endpoint or function. No authentication is needed if the vulnerable component is exposed directly to users. The attack vector is network-based, with low complexity [2].

Impact

Successful exploitation leads to arbitrary code execution, potentially allowing an attacker to compromise the host system, steal data, or pivot to other systems. The CVSS score (not provided in description, but typical for such issues) likely indicates high severity [2].

Mitigation

The vulnerability exists in PaddlePaddle before a certain patch; users should update to the latest version. The PaddlePaddle project provides updates on its GitHub repository [1], and the Huntr bounty page [3] may contain further details on the fix.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
paddlepaddlePyPI
< 2.6.02.6.0

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.