{"id":"CVE-2021-4118","details":"pytorch-lightning is vulnerable to Deserialization of Untrusted Data","aliases":["GHSA-2vj5-px25-gjrp","PYSEC-2021-874"],"modified":"2026-04-10T04:38:45.055295Z","published":"2021-12-23T18:15:07.407Z","references":[{"type":"FIX","url":"https://github.com/pytorchlightning/pytorch-lightning/commit/62f1e82e032eb16565e676d39e0db0cac7e34ace"},{"type":"FIX","url":"https://huntr.dev/bounties/31832f0c-e5bb-4552-a12c-542f81f111e6"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/lightning-ai/pytorch-lightning","events":[{"introduced":"0"},{"fixed":"44e3edbf7a3fffd3069e2bc24c6ee143de79944b"},{"fixed":"62f1e82e032eb16565e676d39e0db0cac7e34ace"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"1.6.0"}]}}],"versions":["0.0.1","0.0.2","0.1.1","0.1.2","0.10.0","0.2","0.2.1","0.4.0","0.4.1","0.4.2","0.4.3","0.4.4","0.4.5","0.4.6","0.4.7","0.4.9","0.5.0","0.5.1","0.5.2","0.5.2.1","0.6.0","0.7.0","0.7.1","0.7.2","0.7.3","0.7.4","0.7.5","0.7.6","0.8.0","0.8.1","0.8.2","0.8.3","0.8.4","0.8.5","0.9.0","1.0.0","1.0.1","1.0.2","1.0.3","1.0.4","1.1.0","1.1.0rc1","1.1.0rc2","1.2.0","1.2.0rc1","1.2.0rc2","1.3.0","1.3.0rc0","1.3.0rc1","1.3.0rc2","1.3.0rc3","1.4.0","1.4.0rc0","1.4.0rc1","1.4.0rc2","1.5.0","1.5.0rc0","1.5.0rc1","1.6.0rc0","1.6.0rc1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-4118.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}