Submit #782201: FedML-AI FedML <= 0.8.9 Remote Code Executioninfo

TitleFedML-AI FedML <= 0.8.9 Remote Code Execution
DescriptionFedml is vulnerable to Remote Code Execution (RCE) due to unsafe deserialization in its gRPC communication manager. The application's gRPC server is exposed to all network interfaces (x.x.x.x) via an insecure port without requiring authentication. Network messages received through the sendMessage() RPC are passed directly to pickle.loads(). This allows an unauthenticated remote attacker to send a maliciously crafted Python pickle payload, which upon deserialization executes arbitrary code on the affected federated learning node.
Source⚠️ https://github.com/AnalogyC0de/public_exp/issues/26
User
 Ana10gy (UID 93358)
Submission03/18/2026 09:44 (19 days ago)
Moderation04/04/2026 08:41 (17 days later)
StatusAccepted
VulDB entry355289 [FedML-AI FedML up to 0.8.9 gRPC server grpc_server.py sendMessage deserialization]
Points20

Want to stay up to date on a daily basis?

Enable the mail alert feature now!