A flaw was found in InstructLab. The `linux_train.py` script hardcodes `trust_remote_code=True` when loading models from HuggingFace. This allows a remote attacker to achieve arbitrary Python code execution by convincing a user to run `ilab train/download/generate` with a specially crafted malicious model from the HuggingFace Hub. This vulnerability can lead to complete system compromise.
Metrics
Affected Vendors & Products
References
History
Wed, 22 Apr 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in InstructLab. The `linux_train.py` script hardcodes `trust_remote_code=True` when loading models from HuggingFace. This allows a remote attacker to achieve arbitrary Python code execution by convincing a user to run `ilab train/download/generate` with a specially crafted malicious model from the HuggingFace Hub. This vulnerability can lead to complete system compromise. | |
| Title | Instructlab: instructlab: arbitrary code execution due to hardcoded `trust_remote_code=true` | |
| First Time appeared |
Redhat
Redhat enterprise Linux Ai |
|
| Weaknesses | CWE-829 | |
| CPEs | cpe:/a:redhat:enterprise_linux_ai:3 | |
| Vendors & Products |
Redhat
Redhat enterprise Linux Ai |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-04-22T13:04:04.795Z
Reserved: 2026-04-22T12:54:46.753Z
Link: CVE-2026-6859
No data.
Status : Awaiting Analysis
Published: 2026-04-22T14:17:07.687
Modified: 2026-04-22T21:23:52.620
Link: CVE-2026-6859
No data.
OpenCVE Enrichment
Updated: 2026-04-22T19:30:24Z