Description
picklescan before 0.0.21 does not treat 'pip' as an unsafe global. An attacker could craft a malicious model that uses Pickle to pull in a malicious PyPI package (hosted, for example, on pypi.org or GitHub) via `pip.main()`. Because pip is not a restricted global, the model, when scanned with picklescan, would pass security checks and appear to be safe, when it could instead prove to be problematic.
Published: 2025-02-26
Score: 5.3 Medium
EPSS: 4.2% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-5323 Picklescan Allows Remote Code Execution via Malicious Pickle File Bypassing Static Analysis
EUVD EUVD EUVD-2025-5523 Picklescan Allows Remote Code Execution via Malicious Pickle File Bypassing Static Analysis
Github GHSA Github GHSA GHSA-655q-fx9r-782v Picklescan Allows Remote Code Execution via Malicious Pickle File Bypassing Static Analysis
History

Mon, 29 Dec 2025 15:30:00 +0000

Type Values Removed Values Added
References

Mon, 29 Dec 2025 14:30:00 +0000

Type Values Removed Values Added
References

Tue, 30 Sep 2025 19:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:mmaitre314:picklescan:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Tue, 04 Mar 2025 03:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 03 Mar 2025 16:15:00 +0000


Wed, 26 Feb 2025 15:00:00 +0000

Type Values Removed Values Added
Description picklescan before 0.0.21 does not treat 'pip' as an unsafe global. An attacker could craft a malicious model that uses Pickle to pull in a malicious PyPI package (hosted, for example, on pypi.org or GitHub) via `pip.main()`. Because pip is not a restricted global, the model, when scanned with picklescan, would pass security checks and appear to be safe, when it could instead prove to be problematic.
Title picklescan - Security scanning bypass via 'pip main'
Weaknesses CWE-184
References
Metrics cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Mmaitre314 Picklescan
cve-icon MITRE

Status: PUBLISHED

Assigner: Sonatype

Published:

Updated: 2025-12-29T14:22:50.868Z

Reserved: 2025-02-26T12:08:39.343Z

Link: CVE-2025-1716

cve-icon Vulnrichment

Updated: 2025-02-26T15:49:30.635Z

cve-icon NVD

Status : Modified

Published: 2025-02-26T15:15:24.653

Modified: 2025-12-29T15:16:00.870

Link: CVE-2025-1716

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-07-12T15:26:25Z

Weaknesses