CVE-2024-12029: Remote Code Execution via Model Deserialization in invoke-ai/invokeai

9.8 CVSS

Description

A remote code execution vulnerability exists in invoke-ai/invokeai versions 5.3.1 through 5.4.2 via the /api/v2/models/install API. The vulnerability arises from unsafe deserialization of model files using torch.load without proper validation. Attackers can exploit this by embedding malicious code in model files, which is executed upon loading. This issue is fixed in version 5.4.3.

Classification

CVE ID: CVE-2024-12029

CVSS Base Severity: CRITICAL

CVSS Base Score: 9.8

CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem Types

CWE-502 Deserialization of Untrusted Data

Affected Products

Vendor: invoke-ai

Product: invoke-ai/invokeai

Exploit Prediction Scoring System (EPSS)

EPSS Score: 45.95% (probability of being exploited)

EPSS Percentile: 97.42% (scored less or equal to compared to others)

EPSS Date: 2025-04-18 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2024-12029
https://huntr.com/bounties/9b790f94-1b1b-4071-bc27-78445d1a87a3
https://github.com/invoke-ai/invokeai/commit/756008dc5899081c5aa51e5bd8f24c1b3975a59e

Timeline