A Protection Mechanism Failure vulnerability in mmaitre314 picklescan versions up to and including 0.0.30 allows a remote attacker to bypass the unsafe globals check. This is possible because the scanner performs an exact match for module names, allowing malicious payloads to be loaded via submodules of dangerous packages (e.g., 'asyncio.unix_events' instead of 'asyncio').
When the incorrectly considered safe file is loaded after scan, it can lead to the execution of malicious code.
When the incorrectly considered safe file is loaded after scan, it can lead to the execution of malicious code.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 17 Sep 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 17 Sep 2025 11:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A Protection Mechanism Failure vulnerability in mmaitre314 picklescan versions up to and including 0.0.30 allows a remote attacker to bypass the unsafe globals check. This is possible because the scanner performs an exact match for module names, allowing malicious payloads to be loaded via submodules of dangerous packages (e.g., 'asyncio.unix_events' instead of 'asyncio'). When the incorrectly considered safe file is loaded after scan, it can lead to the execution of malicious code. | |
Title | PickleScan Bypasses Unsafe Globals Check Using Submodule Imports | |
Weaknesses | CWE-693 | |
References |
|
|
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: JFROG
Published:
Updated: 2025-09-17T13:07:38.291Z
Reserved: 2025-09-09T11:07:37.837Z
Link: CVE-2025-10157

Updated: 2025-09-17T13:07:33.193Z

Status : Received
Published: 2025-09-17T12:15:38.097
Modified: 2025-09-17T12:15:38.097
Link: CVE-2025-10157

No data.

No data.