### Critical Vulnerability Information #### Vulnerability Overview - **Title**: (0Day) Hugging Face Transformers GLM4 Deserialization of Untrusted Data Remote Code Execution Vulnerability - **ID**: - ZDI-25-1145 - ZDI-CAN-28309 - **CVE ID**: CVE-2025-14930 - **CVSS Score**: 7.8, AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H #### Affected Scope - **Affected Vendor**: Hugging Face - **Affected Product**: Transformers #### Vulnerability Details - **Description**: This vulnerability allows remote attackers to execute arbitrary code on affected Hugging Face Transformers installations. User interaction is required to exploit this vulnerability; the target must access a malicious page or open a malicious file. - **Specific Issue**: A specific flaw exists in the weight parsing process, where insufficient validation of user-supplied data leads to deserialization of untrusted data. Attackers can exploit this to execute code within the current process. - **Mitigation**: Given the nature of the vulnerability, the only effective mitigation strategy is to restrict interaction with the product. #### Additional Details - 2025-12-09 - ZDI submitted the report to a third-party bug bounty program - 2025-12-10 - Report rejected due to being out of scope for the bug bounty program - 2025-12-11 - Vendor closed the case, considering it a duplicate of another report - 2025-12-12 - ZDI notified the vendor of intent to publish a 0-day advisory on 2025-12-18 #### Disclosure Timeline - 2025-12-09 - Vulnerability reported to vendor - 2025-12-18 - Coordinated advisory release - 2025-12-18 - Advisory update #### Contributors - Peter Girnus (@gothburz), Demeng Chen, and Brandon Niemczyk of Trend Zero Day Initiative