Description
python jsonpickle 2.0.0 contains a remote code execution vulnerability that allows attackers to execute arbitrary Python commands by deserializing malicious JSON payloads containing py/repr objects. Attackers can craft JSON strings with py/repr directives that invoke the eval function during deserialization to execute system commands and arbitrary code.
Published: 2026-05-16
Score: 9.3 Critical
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A malicious JSON payload containing a py/repr directive can trigger the eval function during deserialization in jsonpickle 2.0.0, allowing an attacker to execute arbitrary Python code. This flaw corresponds to CWE-94 (Code Injection) and permits full control over the target process, potentially leading to system compromise and data theft.

Affected Systems

The vulnerability affects the Jsonpickle library for Python, specifically version 2.0.0. Systems that use this exact version for deserializing JSON data are at risk unless updated to a patched release.

Risk and Exploitability

With a CVSS score of 9.3, the flaw is considered critical. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog. Attackers can exploit it remotely by sending crafted JSON to any service that accepts jsonpickle deserialization, making the risk high in environments where untrusted data is processed.

Generated by OpenCVE AI on May 16, 2026 at 16:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade jsonpickle to the latest stable release that excludes the vulnerable 2.0.0 version.
  • If an upgrade is not immediately possible, disable or restrict the use of jsonpickle for processing untrusted input.
  • Implement strict validation to reject any payload containing the py/repr directive before deserialization.

Generated by OpenCVE AI on May 16, 2026 at 16:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 16 May 2026 15:45:00 +0000

Type Values Removed Values Added
Description python jsonpickle 2.0.0 contains a remote code execution vulnerability that allows attackers to execute arbitrary Python commands by deserializing malicious JSON payloads containing py/repr objects. Attackers can craft JSON strings with py/repr directives that invoke the eval function during deserialization to execute system commands and arbitrary code.
Title python jsonpickle 2.0.0 Remote Code Execution via py/repr
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-16T15:26:06.248Z

Reserved: 2026-02-01T11:24:18.719Z

Link: CVE-2021-47952

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-16T16:16:21.520

Modified: 2026-05-16T16:16:21.520

Link: CVE-2021-47952

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-16T16:30:27Z

Weaknesses