EXECUTIVE SUMMARY:
CVE-2026-44513 with a CVSS score of 8.8 is a vulnerability in the Diffusers package, specifically affecting versions less than 0.38.0. The vulnerability allows for arbitrary remote code execution despite the user passing `trust_remote_code=False`, which is intended to prevent such behavior. An attacker can exploit this vulnerability by using one of three variants, including cross-repo `custom_pipeline`, local snapshot with Hub `custom_pipeline`, or local snapshot with custom components. By bypassing the `trust_remote_code` gate, an attacker gains the capability to execute silent remote code on the victim's machine. The business impact of this vulnerability is significant, as anyone calling `DiffusionPipeline.from_pretrained` with custom pipelines is impacted. To exploit this vulnerability, an attacker requires access to a system where Diffusers is installed and being used, and where the affected versions are present.[/subscribe_to_unlock_form]
EXECUTIVE SUMMARY:
CVE-2026-44513 with a CVSS score of 8.8 is a vulnerability in the Diffusers package, specifically affecting versions less than 0.38.0. The vulnerability allows for arbitrary remote code execution despite the user passing `trust_remote_code=False`, which is intended to prevent such behavior. An attacker can exploit this vulnerability by using one of three variants, including cross-repo `custom_pipeline`, local snapshot with Hub `custom_pipeline`, or local snapshot with custom components. By bypassing the `trust_remote_code` gate, an attacker gains the capability to execute silent remote code on the victim's machine. The business impact of this vulnerability is significant, as anyone calling `DiffusionPipeline.from_pretrained` with custom pipelines is impacted. To exploit this vulnerability, an attacker requires access to a system where Diffusers is installed and being used, and where the affected versions are present.[emaillocker id="1283"]
RECOMMENDATION:
We recommend you to update diffusers to version 0.38.0 or later.
REFERENCES:
The following reports contain further technical details:
https://github.com/advisories/GHSA-98h9-4798-4q5v