Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2809 articles · 109656 vulns · 38/41 feeds (7d)
← Back to list
8.1
CVE-2024-49048PATCHED
pypa · torchgeo

TorchGeo Remote Code Execution Vulnerability

Description

### Impact TorchGeo 0.4–0.6.0 used an [`eval`](https://docs.python.org/3/library/functions.html#eval) statement in its model weight API that could allow an unauthenticated, remote attacker to execute arbitrary commands. All platforms that expose [`torchgeo.models.get_weight()`](https://torchgeo.readthedocs.io/en/v0.6.0/api/models.html#torchgeo.models.get_weight) or [`torchgeo.trainers`](https://torchgeo.readthedocs.io/en/v0.6.0/api/trainers.html) as an external API could be affected. ### Patches The `eval` statement was replaced with a fixed enum lookup, preventing arbitrary code injection. All users are encouraged to upgrade to TorchGeo 0.6.1 or newer. ### Workarounds In unpatched versions, input validation and sanitization can be used to avoid this vulnerability. ### References #### Bug history * Introduced: https://github.com/torchgeo/torchgeo/pull/917 * Patched: https://github.com/torchgeo/torchgeo/pull/2323 * Released: [v0.6.1](https://github.com/microsoft/torchgeo/releases/tag/v0.6.1)

Affected Products

VendorProductVersions
pypatorchgeopip/torchgeo: >= 0.4, <= 0.6.0

Also Affects

Downstream vendors/products affected by this vulnerability

VendorProductSourceConfidence
microsoftappscert_advisory90%

References

  • https://github.com/advisories/GHSA-ghq9-vc6f-8qjf(advisory)
  • https://github.com/torchgeo/torchgeo/security/advisories/GHSA-ghq9-vc6f-8qjf
  • https://nvd.nist.gov/vuln/detail/CVE-2024-49048
  • https://github.com/torchgeo/torchgeo/pull/2323
  • https://github.com/torchgeo/torchgeo/pull/917
  • https://github.com/torchgeo/torchgeo/commit/1a980788cb7089a1115f3b786c7daa9dd47d7d7a
  • https://github.com/microsoft/torchgeo/releases/tag/v0.6.1
  • https://github.com/pypa/advisory-database/tree/main/vulns/torchgeo/PYSEC-2024-204.yaml
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49048
  • https://github.com/advisories/GHSA-ghq9-vc6f-8qjf

Related News (1 articles)

Tier B
BSI Advisories8d ago
[UPDATE] [hoch] Microsoft LightGBM und TorchGeo: Mehrere Schwachstellen ermöglichen Codeausführung
→ No new info (linked only)
CVSS 3.18.1 HIGH
VectorCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA KEV❌ No
Actively exploited❌ No
Patch available
torchgeo@0.6.1
CWECWE-94, CWE-95
PublishedApr 1, 2026
Tags
GHSA-ghq9-vc6f-8qjfpip
Trending Score8
Source articles1
Independent1
Info Completeness0/14
Missing: cve_id, title, description, vendor, product, versions, cvss, epss, cwe, kev, exploit, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-39987EXPKEV
marimo Affected by Pre-Auth Remote Code Execution via Terminal WebSocket Authentication Bypass
Trending: 111
HIGHCVE-2026-40087EXP
LangChain has incomplete f-string validation in prompt templates
Trending: 46
HIGHCVE-2026-39981
AGiXT has a Path Traversal in safe_join()
Trending: 27
HIGHCVE-2026-34824
Mesop: Unbounded Thread Creation in WebSocket Handler Leads to Denial of Service
Trending: 23
MEDIUMCVE-2026-34052
LTI JupyterHub Authenticator: Unbounded Memory Growth via Nonce Storage (Denial of Service)
Trending: 11

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 1, 2026
Patch Available
Apr 1, 2026
Discovered by ZDM
Apr 1, 2026