Cyber Posture

CVE-2025-33239

High

Published: 18 February 2026

Published
18 February 2026
Modified
26 February 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0003 7.8th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-33239 is a high-severity Code Injection (CWE-94) vulnerability in Nvidia Megatron-Bridge. Its CVSS base score is 7.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Command and Scripting Interpreter (T1059); ranked at the 7.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Command and Scripting Interpreter (T1059) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly validates and sanitizes malicious inputs to prevent code injection in the data merging tutorial.

prevent

Remediates the specific code injection flaw through timely patching as advised in NVIDIA and NVD advisories.

prevent

Enforces least privilege to limit the impact of privilege escalation resulting from successful code execution.

MITRE ATT&CK Enterprise TechniquesAI

T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Local code injection (CWE-94) directly enables arbitrary code execution via T1059 and facilitates privilege escalation via T1068.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

NVIDIA Megatron Bridge contains a vulnerability in a data merging tutorial, where malicious input could cause a code injection. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.

Deeper analysisAI

CVE-2025-33239 is a code injection vulnerability (CWE-94) in a data merging tutorial within NVIDIA Megatron Bridge. The issue arises from malicious input that can lead to arbitrary code execution, with potential impacts including escalation of privileges, information disclosure, and data tampering. The vulnerability has a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and was published on 2026-02-18.

A local attacker with low privileges can exploit this vulnerability with low attack complexity and no user interaction required. Successful exploitation might result in code execution, privilege escalation, information disclosure, and data tampering on the affected system.

Mitigation details are available in advisories from the National Vulnerability Database at https://nvd.nist.gov/vuln/detail/CVE-2025-33239, NVIDIA at https://nvidia.custhelp.com/app/answers/detail/a_id/5781, and CVE.org at https://www.cve.org/CVERecord?id=CVE-2025-33239.

Details

CWE(s)

Affected Products

nvidia
megatron-bridge
≤ 0.2.2

CVEs Like This One

CVE-2025-33240Same product: Nvidia Megatron-Bridge
CVE-2025-33236Same vendor: Nvidia
CVE-2025-33251Same vendor: Nvidia
CVE-2025-33249Same vendor: Nvidia
CVE-2025-33246Same vendor: Nvidia
CVE-2025-33250Same vendor: Nvidia
CVE-2025-33247Same vendor: Nvidia
CVE-2025-0161Shared CWE-94
CVE-2025-33179Same vendor: Nvidia
CVE-2025-30067Shared CWE-94

References