Browse all 4 CVE security advisories affecting hiyouga. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Hiyouga develops enterprise software for digital asset management and workflow automation. Historically, their products have been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from insufficient input validation and access control flaws. While no major public security incidents have been widely documented, their CVE history indicates consistent issues with authentication mechanisms and insecure direct object references. The company's security posture appears typical for enterprise software vendors, with vulnerabilities primarily affecting authenticated users and requiring some level of user interaction for exploitation.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-61784 | LLaMA Factory's Chat API has Critical SSRF and LFI Vulnerabilities — LLaMA-FactoryCWE-22 | 7.6 | High | 2025-10-07 |
| CVE-2025-53002 | LLaMA-Factory Remote Code Execution (RCE) Vulnerability — LLaMA-FactoryCWE-94 | 8.3 | High | 2025-06-26 |
| CVE-2025-46567 | LLaMA-Factory Allows Arbitrary Code Execution via Unsafe Deserialization in Ilamafy_baichuan2.py — LLaMA-FactoryCWE-502 | 6.1 | Medium | 2025-05-01 |
| CVE-2024-52803 | LLama Factory Remote OS Command Injection Vulnerability — LLaMA-FactoryCWE-79 | 7.5 | High | 2024-11-21 |
This page lists every published CVE security advisory associated with hiyouga. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.