LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-31224

CVE-2026-31224 - Vulnerability Analysis

HighCVSS: 8.8

Last Updated: May 13, 2026

Snorkel - Insecure Deserialization

Published: May 12, 2026Updated: May 13, 2026Remote Exploitable

Overview

Snorkel <= 0.10.0 contains an insecure deserialization vulnerability caused by unsafe use of torch.load() in MultitaskClassifier.load(), letting remote attackers execute arbitrary code via crafted model files, exploit requires malicious model file.

Severity & Score

Severity: High
CVSS Score: 8.8

Impact

Remote attackers can execute arbitrary code on the victim's system by loading a crafted model file.

Mitigation

Update to the latest version with secure deserialization or apply security-restrictive parameters in torch.load()

Details

CVE ID
CVE-2026-31224
Severity
High
CVSS Score
8.8
Type
insecure_deserialization
Status
confirmed

CWE

  • CWE-502

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H