PyPI: transformers
CVE-2025-3777
Safety vulnerability ID: SFTY-20250707-41014
Safety legacy ID: pyup.io-77986
Hugging Face Transformers versions up to 4.49.0 are affected by an improper input validation vulnerability in the `image_utils.py` file. The vulnerability arises from insecure URL validation using the `startswith()` method, which can be bypassed through URL username injection. This allows attackers to craft URLs that appear to be from YouTube but resolve to malicious domains, potentially leading to phishing attacks, malware distribution, or data exfiltration. The issue is fixed in version 4.52.1.
Overview
Transformers's Improper Input Validation vulnerability can be exploited through username injection
Advisory
Hugging Face Transformers versions up to 4.49.0 are affected by an improper input validation vulnerability in the `image_utils.py` file. The vulnerability arises from insecure URL validation using the `startswith()` method, which can be bypassed through URL username injection. This allows attackers to craft URLs that appear to be from YouTube but resolve to malicious domains, potentially leading to phishing attacks, malware distribution, or data exfiltration. The issue is fixed in version 4.52.1.
How to Fix
Mitigation and Workarounds
---
Vulnerable Functions
Functions linked to known vulnerabilities.
References
- https://getsafety.com/vulnerabilities/SFTY-20250707-41014/CVE-2025-3777
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3777
- https://github.com/advisories/GHSA-phhr-52qp-3mj4
- https://huntr.com/bounties/ccba0730-9248-4853-b7ff-5c20e6364f09
- https://nvd.nist.gov/vuln/detail/CVE-2025-3777
- https://github.com/huggingface/transformers/commit/4dda5f71b35fb70cf602187eef84bb17a50b9082
- https://huntr.com/bounties/ccba0730-9248-4853-b7ff-5c20e6364f09
- https://github.com/huggingface/transformers/blame/a7d2bbaaa8aac64f7c1ee8c1421cfe84b38359a4/src/transformers/image_utils.py
- https://github.com/advisories/GHSA-phhr-52qp-3mj4
Verified by Safety
Our Cybersecurity Intelligence Team reviewed this vulnerability. We combine public data with our own research to find issues not yet reported to public sources.
Learn more
