Impact
A malicious JSON payload containing a py/repr directive can trigger the eval function during deserialization in jsonpickle 2.0.0, allowing an attacker to execute arbitrary Python code. This flaw corresponds to CWE-94 (Code Injection) and permits full control over the target process, potentially leading to system compromise and data theft.
Affected Systems
The vulnerability affects the Jsonpickle library for Python, specifically version 2.0.0. Systems that use this exact version for deserializing JSON data are at risk unless updated to a patched release.
Risk and Exploitability
With a CVSS score of 9.3, the flaw is considered critical. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog. Attackers can exploit it remotely by sending crafted JSON to any service that accepts jsonpickle deserialization, making the risk high in environments where untrusted data is processed.
OpenCVE Enrichment