Impact
A vulnerability in the Pickle Handler of MindsDB allows an attacker to inject malformed pickle data into the pickle.loads function, causing arbitrary deserialization. The exploit is able to be triggered remotely and may lead to execution of arbitrary code on the host where the MindsDB service is running. This weakness is classified under CWE‑20 (Improper Input Validation) and CWE‑502 (Deserialization of Untrusted Data).
Affected Systems
The flaw exists in all MindsDB releases up to 26.01. Vendors that run MindsDB services that accept pickle input from untrusted sources are affected. No other products or versions are mentioned as impacted.
Risk and Exploitability
The CVSS score for this vulnerability is 5.3, indicating moderate severity. The EPSS score is not available, and the vulnerability is not listed in CISA’s KEV catalog. Based on the description, the attack is likely to be remote, requiring access to the public or exposed API endpoint that processes pickle data. An attacker who can send crafted pickle payloads can achieve remote code execution, granting full compromise of the affected system.
OpenCVE Enrichment