Key Information Summary Vulnerability Overview Vulnerability Type: Class Pollution Impact: Leads to DoS attacks Affected Component: ComfyUI Root Cause Analysis Problematic Function: Description: This function, when handling model patches and state data loading, does not restrict access or modification scope. Malicious control modules can exploit specific key-value pairs (such as , , etc.) to modify internal states, enabling arbitrary internal state manipulation and thus facilitating attacks. Proof of Concept (PoC) 1. Download Malicious ControlNet Model: - Use plugins like to download malicious models. 2. Load Model: - Load the model via the workflow template. 3. Select Malicious Model: - Choose the malicious model in the ControlNet loader mode. 4. Run Workflow: - Trigger the function to override the method, causing and its subclasses to raise unavailable errors. References CWE 895: Improperly Controlled Modification of Dynamically Determined Object Attributes Report: Dynamic Class Pollution Vulnerability, Leading to DoS, XSS, SQLi and Authentication Bypass Report: Mosaic Class Pollution Vulnerability leads to DoS and Infoleak attacks Report: NOTION-SWITCHER 1.3.0 SET PROPERTY MK2 NODE GETSETPROP_MK2.PY SETSETPROPNODEMK2 FACTOTYPE PROPNAME Report: Class Pollution leading to RCE in ovash Deep Prototype Pollution in Python Back Class Pollution Gadgets in Jinja Leading to RCE