CVE-2025-13712

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code as root on Tencent HunyuanDiT installations by exploiting insecure deserialization in the merge endpoint. Attackers can trigger this by tricking users into visiting malicious pages or opening malicious files. All users running vulnerable versions of HunyuanDiT are affected.

💻 Affected Systems

Products:
  • Tencent HunyuanDiT
Versions: Versions prior to commit d2cb9cde5c9dc6a6c01735dcb92fe7699ddf6bc5
Operating Systems: All platforms running HunyuanDiT
Default Config Vulnerable: ⚠️ Yes
Notes: The merge endpoint must be accessible and user interaction is required (malicious page/file).

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with root privileges, allowing attackers to install malware, exfiltrate data, or pivot to other systems.

🟠

Likely Case

Remote code execution leading to data theft, ransomware deployment, or unauthorized system access.

🟢

If Mitigated

Attack blocked at network perimeter or through input validation, resulting in failed exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction but is technically straightforward once the malicious payload is delivered.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Commit d2cb9cde5c9dc6a6c01735dcb92fe7699ddf6bc5

Vendor Advisory: https://github.com/Tencent-Hunyuan/HunyuanDiT/commit/d2cb9cde5c9dc6a6c01735dcb92fe7699ddf6bc5

Restart Required: Yes

Instructions:

1. Update HunyuanDiT to commit d2cb9cde5c9dc6a6c01735dcb92fe7699ddf6bc5 or later. 2. Restart the HunyuanDiT service. 3. Verify the fix is applied.

🔧 Temporary Workarounds

Disable merge endpoint

all

Temporarily disable or restrict access to the vulnerable merge endpoint.

# Configure firewall/access controls to block merge endpoint

Input validation

all

Implement strict input validation for deserialization operations.

# Add validation logic to reject untrusted serialized data

🧯 If You Can't Patch

  • Network segmentation to isolate HunyuanDiT from critical systems
  • Implement strict user awareness training about opening untrusted files/links

🔍 How to Verify

Check if Vulnerable:

Check if HunyuanDiT version is prior to commit d2cb9cde5c9dc6a6c01735dcb92fe7699ddf6bc5.

Check Version:

git log --oneline | head -5

Verify Fix Applied:

Confirm the HunyuanDiT installation includes commit d2cb9cde5c9dc6a6c01735dcb92fe7699ddf6bc5.

📡 Detection & Monitoring

Log Indicators:

  • Unusual deserialization errors
  • Suspicious merge endpoint access
  • Unexpected process execution

Network Indicators:

  • HTTP requests to merge endpoint with serialized payloads
  • Outbound connections from HunyuanDiT to unknown IPs

SIEM Query:

source="hunyuan.log" AND ("merge" OR "deserialization")

🔗 References

📤 Share & Export