High severity8.8NVD Advisory· Published May 12, 2026· Updated May 13, 2026
CVE-2026-31224
CVE-2026-31224
Description
The snorkel library thru v0.10.0 contains an insecure deserialization vulnerability (CWE-502) in the MultitaskClassifier.load() method of the MultitaskClassifier class. The method loads model weight files using torch.load() without enabling the security-restrictive weights_only=True parameter. This default behavior allows the deserialization of arbitrary Python objects via the Pickle module. A remote attacker can exploit this by providing a maliciously crafted model file, leading to arbitrary code execution on the victim's system when the file is loaded via the vulnerable method.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- www.notion.so/CVE-2026-31224-35d1e1393188814185f3f6db86c9a4e9nvdThird Party Advisory
News mentions
0No linked articles in our index yet.