OmniGen2-RL contains an unauthenticated remote code execution vulnerability in the reward server component that allows remote attackers to execute arbitrary commands by sending malicious HTTP POST requests. Attackers can exploit insecure pickle deserialization of request bodies to achieve code execution on the host system running the exposed service.
History

Wed, 18 Mar 2026 21:00:00 +0000

Type Values Removed Values Added
Description OmniGen2-RL contains an unauthenticated remote code execution vulnerability in the reward server component that allows remote attackers to execute arbitrary commands by sending malicious HTTP POST requests. Attackers can exploit insecure pickle deserialization of request bodies to achieve code execution on the host system running the exposed service.
Title OmniGen2-RL Reward Server Unsafe Deserialization RCE
Weaknesses CWE-502
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-18T20:56:01.196Z

Reserved: 2026-02-06T19:12:03.464Z

Link: CVE-2026-25873

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-18T21:16:25.220

Modified: 2026-03-18T21:16:25.220

Link: CVE-2026-25873

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.