High severity8.8NVD Advisory· Published May 12, 2026· Updated May 15, 2026
CVE-2026-31222
CVE-2026-31222
Description
The snorkel library thru v0.10.0 contains an insecure deserialization vulnerability (CWE-502) in the Trainer.load() method of the Trainer class. The method loads model checkpoint files using torch.load() without enabling the security-restrictive weights_only=True parameter. This default behavior allows the deserialization of arbitrary Python objects via the Pickle module. A remote attacker can exploit this by providing a maliciously crafted model file, leading to arbitrary code execution on the victim's system when the file is loaded via the vulnerable method.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- www.notion.so/CVE-2026-31222-35d1e139318881db8398e0732af8df6dnvdThird Party Advisory
News mentions
0No linked articles in our index yet.