Get a Demo

Let's Patch It!

Book a short call with one our specialists, we'll walk you through how Endor Patches work, and ask you a few questions about your environment (like your primary programming languages and repository management). We'll also send you an email right after you fill out the form, feel free to reply with any questions you have in advance!

CVE

CVE-2026-44484

Compromise of PyTorch Lightning PyPi Package Versions
Back to all
CVE

CVE-2026-44484

Compromise of PyTorch Lightning PyPi Package Versions

Security Advisory: Compromise of PyTorch Lightning PyPI Package Versions

Published: 2026-04-30  

Last Updated: 2026-04-30  

Lightning AI has identified a security incident affecting certain versions of a PyPI package.

What happened

Lightning AI has determined that one or more released versions of this package have been compromised and include malicious code.

The current investigation indicates that the affected versions have introduced functionality consistent with a credential harvesting mechanism. There is a continuing analysis the scope and behaviour of the code.

At this stage, the root cause of the compromise is still under investigation.

What versions are affected

Lightning AI is currently working to confirm the exact set of impacted versions.

The following versions are determined as affected, and developers should delete them from their systems:

  • 2.6.2
  • 2.6.3

Lightning AI will update this advisory if the versions impacted by this vulnerability change.

What you should do immediately

If developers have installed or are running any potentially affected versions on their application:

  • Assume the environment may be compromised  
  • Immediately rotate all credentials and secrets that may have been exposed, including:  
  • API keys  
  • Access tokens  
  • SSH keys  
  • Service account credentials  
  • Rebuild affected systems from a known clean state  
  • Pin PyTorch Lightning to version 2.6.1  
  • Review logs for any suspicious or unauthorised activity  

Actions Lightning AI has taken

  • Quarantined malicious versions from PyPI  
  • Recommended using version 2.6.1: https://github.com/Lightning-AI/pytorch-lightning/releases/tag/2.6.1  
  • Revoked and rotated all internal credentials associated with our release process  
  • Initiated a full investigation into the compromise  

Ongoing investigation

Lightning AI is actively working to:

  • Identify the exact mechanism of compromise  
  • Confirm the full set of affected versions  
  • Determine the behaviour and impact of the malicious code  
  • Assess any downstream impact to users  

Lightning AI will provide updates as soon as more information becomes available.

Commitment to transparency

Lightning AI takes the security of users and the integrity of the software supply chain extremely seriously.

Lightning AI will continue to share timely and accurate updates as the investigation progresses.

Contact

If there are any questions or if there are concerns that a consuming project may be impacted, please send an email to:

security@lightning.ai

Package Versions Affected

Package Version
patch Availability
No items found.

Automatically patch vulnerabilities without upgrading

Fix Without Upgrading
Detect compatible fix
Apply safe remediation
Fix with a single pull request

CVSS Version

Severity
Base Score
CVSS Version
Score Vector
C
H
U
-
C
H
U
0
-
C
H
U
-

Related Resources

No items found.

References

https://github.com/Lightning-AI/pytorch-lightning/security/advisories/GHSA-w37p-236h-pfx3, https://github.com/Lightning-AI/pytorch-lightning

Severity

0

CVSS Score
0
10

Basic Information

Ecosystem
Base CVSS
0
EPSS Probability
0%
EPSS Percentile
0%
Introduced Version
Fix Available

Fix Critical Vulnerabilities Instantly

Secure your app without upgrading.
Fix Without Upgrading