Impact
DeepDiff's deserialization routine can be misused with malicious pickles to fork constructors of built-in types that accept payload length, causing the program to allocate an extreme amount of memory. The result is a crash that denies service to legitimate users. The vulnerability stems from unchecked constructor arguments in the SAFE_TO_IMPORT classes, a classic CWE-400 style resource exhaustion bug.
Affected Systems
The issue affects the DeepDiff Python library, distributed by the vendor semperman, across every release from version 5.0.0 up to, but not including, 8.6.2. Applications that integrate DeepDiff and deserialize pickle data from untrusted sources are exposed.
Risk and Exploitability
With a CVSS score of 8.7 and an EPSS likelihood below 1 %, the vulnerability is high‑severity but not currently widely exploited. An attacker can remotely supply a crafted 40‑byte pickle payload to an application that loads or compares delta objects, triggering gigabyte‑scale memory allocation and a crash. The recent patch in 8.6.2 removes the unchecked constructor paths, mitigating the risk.
OpenCVE Enrichment
Github GHSA