Deserialization of untrusted data in python in pyfory versions 0.12.0 through 0.12.2, or the legacy pyfury versions from 0.1.0 through 0.10.3: allows arbitrary code execution. An application is vulnerable if it reads pyfory serialized data from untrusted sources. An attacker can craft a data stream that selects pickle-fallback serializer during deserialization, leading to the execution of `pickle.loads`, which is vulnerable to remote code execution.

Users are recommended to upgrade to pyfory version 0.12.3 or later, which has removed pickle fallback serializer and thus fixes this issue.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 01 Oct 2025 10:00:00 +0000

Type Values Removed Values Added
Description Deserialization of untrusted data in python in pyfory versions 0.12.0 through 0.12.2, or the legacy pyfury versions from 0.1.0 through 0.10.3: allows arbitrary code execution. An application is vulnerable if it reads pyfory serialized data from untrusted sources. An attacker can craft a data stream that selects pickle-fallback serializer during deserialization, leading to the execution of `pickle.loads`, which is vulnerable to remote code execution. Users are recommended to upgrade to pyfory version 0.12.3 or later, which has removed pickle fallback serializer and thus fixes this issue.
Title Apache Fory, Apache Fory: Python RCE via unguarded pickle fallback serializer in pyfory
Weaknesses CWE-502
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2025-10-01T09:55:05.557Z

Reserved: 2025-09-29T06:47:23.146Z

Link: CVE-2025-61622

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-10-01T10:15:34.080

Modified: 2025-10-01T10:15:34.080

Link: CVE-2025-61622

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.