Company Details
pytorch
58
297,015
5417
pytorch.org
0
PYT_3585830
In-progress

PyTorch Company CyberSecurity Posture
pytorch.orgAn open source machine learning framework that accelerates the path from research prototyping to production deployment. PyTorch is an open source project at the Linux Foundation.
Company Details
pytorch
58
297,015
5417
pytorch.org
0
PYT_3585830
In-progress
Between 700 and 749

PyTorch Global Score (TPRM)XXXX

Description: A critical vulnerability in PyTorch was identified as CVE-2025-32434 that allows attackers to execute malicious code remotely. The security flaw was found in the torch.load function when used with the weights_only=True parameter, which was formerly considered a safe approach for loading models from untrusted sources. This undermines PyTorch's security recommendations, as many organizations and developers had deployed this parameter specifically for security measures. The vulnerability allows hackers to create harmful model files that, upon loading, can run arbitrary code on the victim's system leading to potential total system compromise. This becomes treacherously dangerous for machine learning pipelines that download and load models from external sources or collaborative environments automatically.
Description: A major security flaw has been found in PyTorch, an open-source machine learning framework, which affects all versions up to and including 2.5.1. The flaw, identified as CVE-2025-32434, allows for remote code execution by attackers on systems that load AI models, even with protective measures enabled. The flaw is located within the torch.load() function. Any application, research tool, or cloud service that employs torch.load() using the unpatched versions of PyTorch is vulnerable. The vulnerability may grant full control over the attacked system and has been classified as critical due to its low complexity and high impact. All users are urged to upgrade immediately to PyTorch 2.6.0.


PyTorch has 284.62% more incidents than the average of same-industry companies with at least one recorded incident.
PyTorch has 212.5% more incidents than the average of all companies with at least one recorded incident.
PyTorch reported 2 incidents this year: 0 cyber attacks, 0 ransomware, 2 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
PyTorch cyber incidents detection timeline including parent company and subsidiaries

An open source machine learning framework that accelerates the path from research prototyping to production deployment. PyTorch is an open source project at the Linux Foundation.


Imagine what you could do at a world-leading university that is globally recognised for its teaching, research and innovation. The University of Edinburgh has been providing students with world-class teaching for more than 425 years, unlocking the potential of some of the world's leading thinkers

UCL (University College London) is London's leading multidisciplinary university, ranked 9th in the QS World University Rankings. Established in 1826 UCL opened up education in England for the first time to students of any race, class or religion and was also the first university to welcome female

The French National Centre for Scientific Research is among the world's leading research institutions. Its scientists explore the living world, matter, the Universe, and the functioning of human societies in order to meet the major challenges of today and tomorrow. Internationally recognised for the
Los Alamos National Laboratory is one of the world’s most innovative multidisciplinary research institutions. We're engaged in strategic science on behalf of national security to ensure the safety and reliability of the U.S. nuclear stockpile. Our workforce specializes in a wide range of progressive
The PPD™ clinical research business of Thermo Fisher Scientific, the world leader in serving science, enables customers to accelerate innovation and drug development through patient-centered strategies and data analytics. Our services, which span multiple therapeutic areas, include early development

At Utrecht University (UU), we are working towards a better world. We do this by researching complex issues beyond the borders of disciplines. We put thinkers in contact with doers, so new insights can be applied. We give students the space to develop themselves. In so doing, we make substantial con

The Chinese Academy of Sciences (CAS) is the lead national scientific institution in natural sciences and high technology development in China and the country's supreme scientific advisory body. It incorporates three major parts: a comprehensive research and development network consisting of 104 res

Delft University of Technology (TU Delft) is a leading technical university in the Netherlands, known for our world-class engineering, science and design education. We offer top-ranked education and PhD programmes, and we conduct cutting-edge research that addresses global challenges. TU Delft play

King’s College London is amongst the top 40 universities in the world and top 10 in Europe (THE World University Rankings 2024), and one of England’s oldest and most prestigious universities. With an outstanding reputation for world-class teaching and cutting-edge research, King’s maintained its si
.png)
A memory bug in vLLM versions 0.10.2 and later lets attackers run remote code by sending harmful prompt embeddings to the Completions API.
The vulnerability affects vLLM versions 0.10.2 and later, stemming from improper handling of user-supplied prompt embeddings.
As artificial intelligence infrastructure rapidly expands, critical security flaws threaten the backbone of enterprise AI deployments.
Cybersecurity researchers have uncovered critical remote code execution vulnerabilities impacting major artificial intelligence (AI)...
Explore how outdated vulnerabilities continue to undermine AI security, posing serious risks to systems and data despite advanced protection measures.
A critical vulnerability in NVIDIA's Merlin Transformers4Rec library (CVE-2025-23298) enables unauthenticated attackers to achieve remote...
Discovered by the Trend Micro Zero Day Initiative (ZDI) Threat Hunting Team, the flaw stems from unsafe deserialization in the model...
A critical vulnerability in NVIDIA's Merlin Transformers4Rec library allows attackers to achieve remote code execution with root privileges.
Hackers can weaponize hidden prompts revealed by downscaled images to trigger sensitive tool actions and achieve data exfiltration in Gemini...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of PyTorch is http://www.pytorch.org.
According to Rankiteo, PyTorch’s AI-generated cybersecurity score is 749, reflecting their Moderate security posture.
According to Rankiteo, PyTorch currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, PyTorch is not certified under SOC 2 Type 1.
According to Rankiteo, PyTorch does not hold a SOC 2 Type 2 certification.
According to Rankiteo, PyTorch is not listed as GDPR compliant.
According to Rankiteo, PyTorch does not currently maintain PCI DSS compliance.
According to Rankiteo, PyTorch is not compliant with HIPAA regulations.
According to Rankiteo,PyTorch is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
PyTorch operates primarily in the Research Services industry.
PyTorch employs approximately 58 people worldwide.
PyTorch presently has no subsidiaries across any sectors.
PyTorch’s official LinkedIn profile has approximately 297,015 followers.
PyTorch is classified under the NAICS code 5417, which corresponds to Scientific Research and Development Services.
No, PyTorch does not have a profile on Crunchbase.
Yes, PyTorch maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/pytorch.
As of December 02, 2025, Rankiteo reports that PyTorch has experienced 2 cybersecurity incidents.
PyTorch has an estimated 4,814 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability.
Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with upgrade to pytorch 2.6.0..
Title: PyTorch Remote Code Execution Vulnerability
Description: A major security flaw has been found in PyTorch, an open-source machine learning framework, which affects all versions up to and including 2.5.1. The flaw, identified as CVE-2025-32434, allows for remote code execution by attackers on systems that load AI models, even with protective measures enabled. The flaw is located within the torch.load() function. Any application, research tool, or cloud service that employs torch.load() using the unpatched versions of PyTorch is vulnerable. The vulnerability may grant full control over the attacked system and has been classified as critical due to its low complexity and high impact. All users are urged to upgrade immediately to PyTorch 2.6.0.
Type: Vulnerability Exploit
Attack Vector: Remote Code Execution
Vulnerability Exploited: CVE-2025-32434
Title: Critical Vulnerability in PyTorch CVE-2025-32434
Description: A critical vulnerability in PyTorch was identified as CVE-2025-32434 that allows attackers to execute malicious code remotely. The security flaw was found in the torch.load function when used with the weights_only=True parameter, which was formerly considered a safe approach for loading models from untrusted sources. This undermines PyTorch's security recommendations, as many organizations and developers had deployed this parameter specifically for security measures. The vulnerability allows hackers to create harmful model files that, upon loading, can run arbitrary code on the victim's system leading to potential total system compromise. This becomes treacherously dangerous for machine learning pipelines that download and load models from external sources or collaborative environments automatically.
Type: Vulnerability Exploitation
Attack Vector: Remote Code Execution
Vulnerability Exploited: CVE-2025-32434
Motivation: Malicious Code Execution
Common Attack Types: The most common types of attacks the company has faced is Vulnerability.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through torch.load function with weights_only=True parameter.

Systems Affected: Any application, research tool, or cloud service that employs torch.load() using the unpatched versions of PyTorch

Systems Affected: Machine learning pipelines
Operational Impact: Potential total system compromise

Entity Name: PyTorch Users
Entity Type: Developers and Organizations
Industry: Technology, Machine Learning

Remediation Measures: Upgrade to PyTorch 2.6.0
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Upgrade to PyTorch 2.6.0, .

Recommendations: Upgrade to PyTorch 2.6.0

Entry Point: torch.load function with weights_only=True parameter
High Value Targets: Machine learning pipelines
Data Sold on Dark Web: Machine learning pipelines

Root Causes: Security flaw in torch.load function
Most Significant System Affected: The most significant system affected in an incident were Any application, research tool, or cloud service that employs torch.load() using the unpatched versions of PyTorch and .
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Upgrade to PyTorch 2.6.0.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an torch.load function with weights_only=True parameter.
.png)
vLLM is an inference and serving engine for large language models (LLMs). Prior to 0.11.1, vllm has a critical remote code execution vector in a config class named Nemotron_Nano_VL_Config. When vllm loads a model config that contains an auto_map entry, the config class resolves that mapping with get_class_from_dynamic_module(...) and immediately instantiates the returned class. This fetches and executes Python from the remote repository referenced in the auto_map string. Crucially, this happens even when the caller explicitly sets trust_remote_code=False in vllm.transformers_utils.config.get_config. In practice, an attacker can publish a benign-looking frontend repo whose config.json points via auto_map to a separate malicious backend repo; loading the frontend will silently run the backend’s code on the victim host. This vulnerability is fixed in 0.11.1.
fastify-reply-from is a Fastify plugin to forward the current HTTP request to another server. Prior to 12.5.0, by crafting a malicious URL, an attacker could access routes that are not allowed, even though the reply.from is defined for specific routes in @fastify/reply-from. This vulnerability is fixed in 12.5.0.
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to 21.0.2, 20.3.15, and 19.2.17, A Stored Cross-Site Scripting (XSS) vulnerability has been identified in the Angular Template Compiler. It occurs because the compiler's internal security schema is incomplete, allowing attackers to bypass Angular's built-in security sanitization. Specifically, the schema fails to classify certain URL-holding attributes (e.g., those that could contain javascript: URLs) as requiring strict URL security, enabling the injection of malicious scripts. This vulnerability is fixed in 21.0.2, 20.3.15, and 19.2.17.
Gin-vue-admin is a backstage management system based on vue and gin. In 2.8.6 and earlier, attackers can delete any file on the server at will, causing damage or unavailability of server resources. Attackers can control the 'FileMd5' parameter to delete any file and folder.
Portkey.ai Gateway is a blazing fast AI Gateway with integrated guardrails. Prior to 1.14.0, the gateway determined the destination baseURL by prioritizing the value in the x-portkey-custom-host request header. The proxy route then appends the client-specified path to perform an external fetch. This can be maliciously used by users for SSRF attacks. This vulnerability is fixed in 1.14.0.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.