An issue in Step-Video-T2V allows a remote attacker to execute arbitrary code via the /vae-api , /caption-api , feature = pickle.loads(request.get_data()) component
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 03 Mar 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue in Step-Video-T2V allows a remote attacker to execute arbitrary code via the /vae-api , /caption-api , feature = pickle.loads(request.get_data()) component | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-03-03T14:33:50.707Z
Reserved: 2025-08-17T00:00:00.000Z
Link: CVE-2025-57622
No data.
Status : Received
Published: 2026-03-03T15:16:15.397
Modified: 2026-03-03T15:16:15.397
Link: CVE-2025-57622
No data.
OpenCVE Enrichment
No data.
Weaknesses
No weakness.