CVE-2026-25874
Severity CVSS v4.0:
CRITICAL
Type:
CWE-502
Deserialization of Untrusted Dat
Publication date:
23/04/2026
Last modified:
28/04/2026
Description
LeRobot through 0.5.1 contains an unsafe deserialization vulnerability in the async inference pipeline where pickle.loads() is used to deserialize data received over unauthenticated gRPC channels without TLS in the policy server and robot client components. An unauthenticated network-reachable attacker can achieve arbitrary code execution on the server or client by sending a crafted pickle payload through the SendPolicyInstructions, SendObservations, or GetActions gRPC calls.
Impact
Base Score 4.0
9.30
Severity 4.0
CRITICAL
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:huggingface:lerobot:*:*:*:*:*:python:*:* | 0.5.1 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://chocapikk.com/posts/2026/lerobot-pickle-rce/
- https://github.com/huggingface/lerobot/issues/3047
- https://github.com/huggingface/lerobot/issues/3134
- https://github.com/huggingface/lerobot/pull/3048
- https://www.vulncheck.com/advisories/lerobot-unsafe-deserialization-remote-code-execution-via-grpc



