Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2025-50460

Description

A remote code execution (RCE) vulnerability exists in the ms-swift project version 3.3.0 due to unsafe deserialization in tests/run.py using yaml.load() from the PyYAML library (versions = 5.3.1). If an attacker can control the content of the YAML configuration file passed to the --run_config parameter, arbitrary code can be executed during deserialization. This can lead to full system compromise. The vulnerability is triggered when a malicious YAML file is loaded, allowing the execution of arbitrary Python commands such as os.system(). It is recommended to upgrade PyYAML to version 5.4 or higher, and to use yaml.safe_load() to mitigate the issue.

POC

Reference

- https://github.com/Anchor0221/CVE-2025-50460

Github

- https://github.com/ARPSyndicate/cve-scores

- https://github.com/Anchor0221/CVE-2025-50460

- https://github.com/PuddinCat/GithubRepoSpider

- https://github.com/fkie-cad/nvd-json-data-feeds

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/yembors64632/cve_monitor_Public