When the incorrectly considered safe file is loaded after scan, it can lead to the execution of malicious code.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-29711 | Picklescan is Vulnerable to Unsafe Globals Check Bypass through Subclass Imports |
Github GHSA |
GHSA-f7qq-56ww-84cr | Picklescan is Vulnerable to Unsafe Globals Check Bypass through Subclass Imports |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 02 Oct 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:mmaitre314:picklescan:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Thu, 18 Sep 2025 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mmaitre314
Mmaitre314 picklescan |
|
| Vendors & Products |
Mmaitre314
Mmaitre314 picklescan |
Wed, 17 Sep 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 17 Sep 2025 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Protection Mechanism Failure vulnerability in mmaitre314 picklescan versions up to and including 0.0.30 allows a remote attacker to bypass the unsafe globals check. This is possible because the scanner performs an exact match for module names, allowing malicious payloads to be loaded via submodules of dangerous packages (e.g., 'asyncio.unix_events' instead of 'asyncio'). When the incorrectly considered safe file is loaded after scan, it can lead to the execution of malicious code. | |
| Title | PickleScan Bypasses Unsafe Globals Check Using Submodule Imports | |
| Weaknesses | CWE-693 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: JFROG
Published:
Updated: 2025-09-17T13:07:38.291Z
Reserved: 2025-09-09T11:07:37.837Z
Link: CVE-2025-10157
Updated: 2025-09-17T13:07:33.193Z
Status : Undergoing Analysis
Published: 2025-09-17T12:15:38.097
Modified: 2025-10-02T18:59:26.497
Link: CVE-2025-10157
No data.
OpenCVE Enrichment
Updated: 2025-09-18T12:41:51Z
EUVD
Github GHSA