Improper Output Neutralization for Logs Affecting nvidia-pytriton package, versions [,0.5.8)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.37% (59th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Output Neutralization for Logs vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PYTHON-NVIDIAPYTRITON-13553030
  • published15 Oct 2025
  • disclosed13 Jun 2024
  • creditpinkdraconian

Introduced: 13 Jun 2024

CVE-2024-0095  (opens in a new tab)
CWE-117  (opens in a new tab)

How to fix?

Upgrade nvidia-pytriton to version 0.5.8 or higher.

Overview

nvidia-pytriton is a PyTriton - Flask/FastAPI-like interface to simplify Triton's deployment in Python environments.

Affected versions of this package are vulnerable to Improper Output Neutralization for Logs via the logging extension. An attacker can inject forged logs and executable commands by injecting arbitrary data as a new log entry. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.

This vulnerability is only exploitable when using the default Triton Server binary bundled in /pytriton/tritonserver/bin/tritonserver.

It is possible to update the Triton Server binary to a patched version independently of PyTriton; See Building binaries from source.

CVSS Base Scores

version 4.0
version 3.1