Impact
A flaw in pytries datrie (up to version 0.8.3) in the Trie.__setstate__ routine allows an attacker to provide a crafted serialized payload that is processed during deserialization. The vulnerability aligns with CWE‑20 (Improper Input Validation) and CWE‑502 (Deserialization of Untrusted Data). If an application loads a trie from external input, an attacker could exploit this flaw to execute arbitrary code or otherwise compromise the system, impacting confidentiality, integrity, and availability.
Affected Systems
The affected product is the pytries datrie library, versions up to 0.8.3. The library is hosted on GitHub and used in Python projects that rely on trie functionality. No specific sub‑versions are listed beyond the 0.8.3 cutoff.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate overall damage potential, but the lack of a patch means the vulnerability remains exploitable. Public exploit code is available, and the attack can be launched remotely by supplying malicious data to an application that deserializes using Trie.__setstate__. EPSS data is not available and the vulnerability is not listed in CISA’s KEV catalog, yet the remote nature and deserialization weakness make it a serious risk for vulnerable deployments.
OpenCVE Enrichment