An Improper Input Validation vulnerability in the scanning logic of mmaitre314 picklescan versions up to and including 0.0.30 allows a remote attacker to bypass pickle files security checks by supplying a standard pickle file with a PyTorch-related file extension. When the pickle file incorrectly considered safe is loaded, it can lead to the execution of malicious code.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 17 Sep 2025 10:00:00 +0000

Type Values Removed Values Added
Description An Improper Input Validation vulnerability in the scanning logic of mmaitre314 picklescan versions up to and including 0.0.30 allows a remote attacker to bypass pickle files security checks by supplying a standard pickle file with a PyTorch-related file extension. When the pickle file incorrectly considered safe is loaded, it can lead to the execution of malicious code.
Title PickleScan Security Bypass Using Misleading File Extension
Weaknesses CWE-20
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: JFROG

Published:

Updated: 2025-09-17T13:04:03.089Z

Reserved: 2025-09-09T11:07:33.136Z

Link: CVE-2025-10155

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-09-17T10:15:36.913

Modified: 2025-09-17T10:15:36.913

Link: CVE-2025-10155

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.