confirmed
Description
paddlepaddle/paddle 2.6.0 allows arbitrary file read via paddle.vision.ops.read_file.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
PaddlePaddle 2.6.0's paddle.vision.ops.read_file lacks input validation, allowing arbitrary file read on the server.
Vulnerability
Overview
The vulnerability in paddlepaddle/paddle version 2.6.0 stems from the function paddle.vision.ops.read_file which does not properly validate the path provided as input. This function, located in python/paddle/vision/ops.py around line 1262, directly passes a user-supplied file path to a file-reading operation without checking for path traversal components like ../ or ensuring the path stays within an allowed directory [3][4].
Exploitation
An attacker can exploit this flaw by providing a crafted file path that traverses the filesystem directory structure. For example, a path such as ../../etc/passwd would cause the function to read sensitive system files. No authentication or complex network position is required; the attack surface is any application or scenario where an attacker can influence the argument passed to read_file. This is a classic path traversal vulnerability [2].
Impact
Successful exploitation allows an attacker to read arbitrary files from the server filesystem that the PaddlePaddle process has access to. In a typical deployment, this could include sensitive configuration files, credentials, source code, or other confidential data, leading to information disclosure and potential further compromise of the system [1][2].
Mitigation
As of the publication date, users of PaddlePaddle 2.6.0 are advised to apply any patches released by the vendor. The vulnerability was reported through a bug bounty program (huntr.dev) and a fix may be available in newer versions of the framework. Users should update to a patched version or apply input validation on any user-supplied paths before passing them to read_file as a workaround [1][2].
- GitHub - PaddlePaddle/Paddle: PArallel Distributed Deep LEarning: Machine Learning Framework from Industrial Practice (『飞桨』核心框架,深度学习&机器学习高性能单机、分布式训练和跨平台部署)
- NVD - CVE-2024-1603
- Paddle/python/paddle/vision/ops.py at release/2.6 · PaddlePaddle/Paddle
- Paddle/python/paddle/vision/ops.py at release/2.6 · PaddlePaddle/Paddle
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
paddlepaddlePyPI | <= 2.6.0 | — |
Affected products
2- paddlepaddle/paddlepaddle/paddlev5Range: unspecified
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-jwrc-3v3f-5cq5ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-1603ghsaADVISORY
- github.com/PaddlePaddle/Paddle/blob/release/2.6/python/paddle/vision/ops.pyghsaWEB
- github.com/PaddlePaddle/Paddle/blob/release/2.6/python/paddle/vision/ops.pyghsaWEB
- huntr.com/bounties/7739eced-73a3-4a96-afcd-9c753c55929eghsaWEB
News mentions
0No linked articles in our index yet.