OmniGen2-RL contains an unauthenticated remote code execution vulnerability in the reward server component that allows remote attackers to execute arbitrary commands by sending malicious HTTP POST requests. Attackers can exploit insecure pickle deserialization of request bodies to achieve code execution on the host system running the exposed service.
Metrics
Affected Vendors & Products
References
History
Wed, 18 Mar 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OmniGen2-RL contains an unauthenticated remote code execution vulnerability in the reward server component that allows remote attackers to execute arbitrary commands by sending malicious HTTP POST requests. Attackers can exploit insecure pickle deserialization of request bodies to achieve code execution on the host system running the exposed service. | |
| Title | OmniGen2-RL Reward Server Unsafe Deserialization RCE | |
| Weaknesses | CWE-502 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-18T20:56:01.196Z
Reserved: 2026-02-06T19:12:03.464Z
Link: CVE-2026-25873
No data.
Status : Received
Published: 2026-03-18T21:16:25.220
Modified: 2026-03-18T21:16:25.220
Link: CVE-2026-25873
No data.
OpenCVE Enrichment
No data.