Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-29708 | Picklescan: ZIP archive scan bypass is possible through non-exhaustive Cyclic Redundancy Check |
Github GHSA |
GHSA-mjqp-26hc-grxg | Picklescan: ZIP archive scan bypass is possible through non-exhaustive Cyclic Redundancy Check |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 02 Oct 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:mmaitre314:picklescan:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Thu, 18 Sep 2025 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mmaitre314
Mmaitre314 picklescan |
|
| Vendors & Products |
Mmaitre314
Mmaitre314 picklescan |
Wed, 17 Sep 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 17 Sep 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An Improper Handling of Exceptional Conditions vulnerability in the ZIP archive scanning component of mmaitre314 picklescan allows a remote attacker to bypass security scans. This is achieved by crafting a ZIP archive containing a file with a bad Cyclic Redundancy Check (CRC), which causes the scanner to halt and fail to analyze the contents for malicious pickle files. When the file incorrectly considered safe is loaded, it can lead to the execution of malicious code. | |
| Title | PickleScan Security Bypass via Bad CRC in ZIP Archive | |
| Weaknesses | CWE-755 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: JFROG
Published:
Updated: 2025-09-17T13:04:36.225Z
Reserved: 2025-09-09T11:07:36.610Z
Link: CVE-2025-10156
Updated: 2025-09-17T13:04:32.601Z
Status : Analyzed
Published: 2025-09-17T11:15:32.020
Modified: 2025-10-02T19:04:56.000
Link: CVE-2025-10156
No data.
OpenCVE Enrichment
Updated: 2025-09-18T12:41:57Z
EUVD
Github GHSA