High severity7.8NVD Advisory· Published May 12, 2026· Updated May 15, 2026
CVE-2026-31221
CVE-2026-31221
Description
PyTorch-Lightning versions 2.6.0 and earlier contain an insecure deserialization vulnerability (CWE-502) in the checkpoint loading mechanism. The LightningModule.load_from_checkpoint() method, which is commonly used to load saved model states, internally calls torch.load() without setting the security-restrictive weights_only=True parameter. This default behavior allows the deserialization of arbitrary Python objects via the Pickle module. A remote attacker can exploit this by providing a maliciously crafted checkpoint file, leading to arbitrary code execution on the victim's system when the file is loaded.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- www.notion.so/CVE-2026-31221-35d1e1393188815f8db7c4fd08076639nvdExploitThird Party Advisory
News mentions
0No linked articles in our index yet.