LeRobot Vulnerability Enables Unauthenticated Remote Code Execution
A critical unauthenticated remote code execution (RCE) vulnerability, tracked as CVE-2026-25874, has been disclosed in Hugging Face's open-source robotics framework LeRobot, according to the project GitHub issue and the NVD. The flaw stems from unsafe deserialization where pickle.loads() is called on bytes received over unauthenticated gRPC channels in the async inference pipeline, per the LeRobot GitHub issue #3047. NVD documents the same vulnerability and the GitHub issue includes a proof-of-concept that uses an insecure gRPC channel to trigger pickle deserialization. Public reporting (The Hacker News, Resecurity) notes the issue remains unpatched and has been validated against LeRobot versions including 0.4.3. The vulnerability carries a high CVSS severity (public reports cite 9.3) and affects network-reachable PolicyServer and robot client endpoints.
What happened
A critical unauthenticated remote code execution vulnerability, tracked as CVE-2026-25874, was disclosed in Hugging Face's open-source robotics framework LeRobot, according to the LeRobot GitHub issue #3047 and the NVD entry for the CVE. The NVD and public reporting cite the flaw as unsafe deserialization that enables an attacker to execute arbitrary system commands via crafted Python pickle payloads delivered over unauthenticated gRPC channels. Public outlets and security vendors (The Hacker News, Resecurity, VulnCheck) report the issue has been validated against LeRobot releases including 0.4.3 and that remediation is not yet broadly available.
Technical details
Per the LeRobot GitHub issue #3047, the async inference components policy_server.py and robot_client.py call pickle.loads() on received bytes fields before any validation. The issue description lists the affected callsites in src/lerobot/async_inference/policy_server.py and src/lerobot/async_inference/robot_client.py and enumerates attack vectors via the gRPC RPCs SendPolicyInstructions, SendObservations, and GetActions. The GitHub proof-of-concept shows exploitation using an insecure gRPC channel (the issue uses grpc.insecure_channel), and the NVD entry documents the same vulnerable configuration, identifying the weakness as CWE-502, Deserialization of Untrusted Data.
Industry context
Editorial analysis: Deserialization flaws in Python pickle have a long history of high-impact remote code execution in networked services because pickle encodes executable object constructors. Industry-pattern observations show that when such code paths are exposed over unauthenticated transport like an insecure gRPC port, the exploitability window is large, especially for projects deployed in research labs or production robotics environments where services often run with elevated access to hardware and internal networks. Public reporting highlights risks beyond single-host compromise, including potential lateral movement, theft of keys and model artifacts, and impacts to connected robotic systems (The Hacker News, AI Security Daily Briefing).
What to watch
For practitioners: monitor for an upstream security advisory or patch from the LeRobot project and for coordinated vendor advisories indexed by NVD. Observers should inventory network-exposed LeRobot instances, check running versions against the affected range documented in NVD, and review logging for unexpected gRPC activity on PolicyServer and robot client ports. Industry context: Watch security feeds for proof-of-exploit or exploit code reuse; public disclosure of a PoC combined with an unpatched, network-reachable service typically accelerates opportunistic scanning and exploitation.
Implications for deployers and integrators
Editorial analysis: Organizations embedding open-source robotics frameworks into labs or operational systems face compound risk because robotics stacks can bridge IT and OT environments. Industry-pattern observations recommend treating third-party research and orchestration services as attack surface: absence of authentication and encryption on RPC channels materially increases risk. Given the public PoC and high CVSS severity reported, defenders should assume exploitation attempts will appear in scanning telemetry following the disclosure.
Scoring Rationale
A critical unauthenticated RCE in a popular open-source robotics framework is highly relevant to security-conscious ML and robotics teams. Public proof-of-concept code and a high CVSS score raise the likelihood of exploitation, making this a notable operational risk.
Practice with real Retail & eCommerce data
90 SQL & Python problems · 15 industry datasets
250 free problems · No credit card
See all Retail & eCommerce problems


