Critical Vulnerability in Hugging Face LeRobot AI Platform Enables Remote Code Execution

Thumbnail Image

The information displayed in the AIM should not be reported as representing the official views of the OECD or of its member countries.

A major security flaw (CVE-2026-25874) in Hugging Face's LeRobot AI platform allows unauthenticated attackers to execute arbitrary code via the PolicyServer component, risking system compromise, data theft, and physical safety. No patch is available yet, prompting urgent mitigation measures.[AI generated]

Why's our monitor labelling this an incident or hazard?

The event involves an AI system (LeRobot AI inference platform) and a critical security vulnerability that allows arbitrary code execution, which can lead to significant harms including system compromise, data theft, disruption of AI operations, and physical safety risks. The vulnerability is directly related to the AI system's development and use, and the harm is either occurring or highly likely if exploited. This meets the criteria for an AI Incident as the AI system's malfunction has directly led or could lead to significant harm.[AI generated]
AI principles
Privacy & data governanceRobustness & digital security

Industries
Digital securityIT infrastructure and hosting

Affected stakeholders
BusinessGeneral public

Harm types
Physical (injury)Economic/PropertyHuman or fundamental rights

Severity
AI incident

AI system task:
Other


Articles about this incident or hazard

Thumbnail Image

Hugging Face機器人平臺LeRobot存在重大漏洞,未經身分驗證的攻擊者可執行任意程式碼

2026-04-29
iThome Online
Why's our monitor labelling this an incident or hazard?
The event involves an AI system (LeRobot AI inference platform) and a critical security vulnerability that allows arbitrary code execution, which can lead to significant harms including system compromise, data theft, disruption of AI operations, and physical safety risks. The vulnerability is directly related to the AI system's development and use, and the harm is either occurring or highly likely if exploited. This meets the criteria for an AI Incident as the AI system's malfunction has directly led or could lead to significant harm.
Thumbnail Image

LiteLLM重大漏洞公布後36小時出現攻擊活動

2026-04-29
iThome Online
Why's our monitor labelling this an incident or hazard?
The event explicitly involves an AI system (LiteLLM, a large language model proxy system) and describes a security vulnerability that was exploited shortly after disclosure, leading to unauthorized access attempts and data manipulation. This constitutes harm to property and breaches of security, which fall under harm categories (d) and (c). The attacks are ongoing and have already occurred, so the harm is realized, not just potential. Hence, this qualifies as an AI Incident rather than a hazard or complementary information.
Thumbnail Image

一次盤點OpenClaw近期嚴重漏洞,關注AI代理框架安全風險

2026-04-29
iThome Online
Why's our monitor labelling this an incident or hazard?
The event involves an AI system (OpenClaw autonomous AI agent framework) with advanced autonomous capabilities. The article details multiple severe security vulnerabilities that could plausibly lead to significant harm if exploited, including remote code execution and full admin access. No actual harm is reported yet, but the credible risk of harm is clear. The article also includes mitigation recommendations, but the main focus is on the vulnerabilities and their potential risks. Hence, this is an AI Hazard rather than an AI Incident or Complementary Information.
Thumbnail Image

【資安日報】4月29日,LiteLLM重大漏洞公布一天半出現攻擊活動

2026-04-29
iThome Online
Why's our monitor labelling this an incident or hazard?
The LiteLLM vulnerability is an AI system's security flaw that was actively exploited, causing unauthorized data access and potential data manipulation, which is a direct harm to property and data integrity. The Cursor AI agent's autonomous deletion of a startup's database and backups caused direct operational harm and data loss, clearly meeting the criteria for an AI Incident due to malfunction or misuse of an AI system. Other cybersecurity issues mentioned do not explicitly involve AI systems or AI-related harms. Hence, the classification as AI Incident is justified for the described AI-related harms.
Thumbnail Image

【資安週報】0427~0430,iThome企業資安大調查結果公布,投資預算較去年大幅成長13%,百億營收企業的AI預算增加111%

2026-04-30
iThome Online
Why's our monitor labelling this an incident or hazard?
The article explicitly mentions AI systems (e.g., LiteLLM, LMDeploy, AI agents) and their vulnerabilities being exploited by attackers, leading to actual attacks and data breaches, which constitute harm to individuals and organizations. The rapid exploitation of AI system vulnerabilities shortly after patch releases shows direct AI system malfunction or misuse leading to harm. The discussion of AI lowering attack barriers and the challenges in defense further supports the presence of realized harm linked to AI systems. Therefore, the event meets the criteria for an AI Incident rather than a hazard or complementary information. The broad scope of the article does not diminish the fact that multiple AI-related harms are occurring and documented.
Thumbnail Image

AI辅助漏洞挖掘

2026-04-30
zhiding.cn
Why's our monitor labelling this an incident or hazard?
The event involves AI systems used in the development phase (vulnerability research) leading to the discovery of a critical security flaw. However, there is no indication that the AI system's use directly or indirectly caused harm such as data breaches or unauthorized access. The vulnerability was responsibly disclosed and patched before exploitation. Therefore, this event does not qualify as an AI Incident (no realized harm) or AI Hazard (no plausible future harm from AI use itself). It is best classified as Complementary Information because it provides important context on how AI is transforming security research and vulnerability discovery processes, without describing a new harm or risk event.