OmniGen2-RL contains an unauthenticated remote code execution vulnerability in the reward server component that allows remote attackers to execute arbitrary commands by sending malicious HTTP POST requests. Attackers can exploit insecure pickle deserialization of request bodies to achieve code execution on the host system running the exposed service.
Project Subscriptions
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 19 Mar 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Beijing Academy Of Artificial Intelligence
Beijing Academy Of Artificial Intelligence omnigen2-rl |
|
| Vendors & Products |
Beijing Academy Of Artificial Intelligence
Beijing Academy Of Artificial Intelligence omnigen2-rl |
Wed, 18 Mar 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OmniGen2-RL contains an unauthenticated remote code execution vulnerability in the reward server component that allows remote attackers to execute arbitrary commands by sending malicious HTTP POST requests. Attackers can exploit insecure pickle deserialization of request bodies to achieve code execution on the host system running the exposed service. | |
| Title | OmniGen2-RL Reward Server Unsafe Deserialization RCE | |
| Weaknesses | CWE-502 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-18T20:56:01.196Z
Reserved: 2026-02-06T19:12:03.464Z
Link: CVE-2026-25873
No data.
Status : Received
Published: 2026-03-18T21:16:25.220
Modified: 2026-03-18T21:16:25.220
Link: CVE-2026-25873
No data.
OpenCVE Enrichment
Updated: 2026-03-19T08:55:29Z
Weaknesses