Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
9.8
Step-Video-T2V allows remote code execution via malicious API requests
CVE-2025-57622
Summary
An issue in Step-Video-T2V's APIs allows an attacker to inject malicious code, potentially executing arbitrary commands on the server. This could lead to unauthorized access and data theft or corruption. To protect against this, update to the latest version of Step-Video-T2V or apply a patch if available.
Original title
An issue in Step-Video-T2V allows a remote attacker to execute arbitrary code via the /vae-api , /caption-api , feature = pickle.loads(request.get_data()) component
Original description
An issue in Step-Video-T2V allows a remote attacker to execute arbitrary code via the /vae-api , /caption-api , feature = pickle.loads(request.get_data()) component
Vulnerability type
CWE-502
Deserialization of Untrusted Data
Published: 3 Mar 2026 · Updated: 13 Mar 2026 · First seen: 6 Mar 2026