Description
A security vulnerability has been detected in MindsDB up to 26.01. Affected is the function pickle.loads of the component Pickle Handler. The manipulation leads to deserialization. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-05-03
Score: 5.3 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A vulnerability in the Pickle Handler of MindsDB allows an attacker to inject malformed pickle data into the pickle.loads function, causing arbitrary deserialization. The exploit is able to be triggered remotely and may lead to execution of arbitrary code on the host where the MindsDB service is running. This weakness is classified under CWE‑20 (Improper Input Validation) and CWE‑502 (Deserialization of Untrusted Data).

Affected Systems

The flaw exists in all MindsDB releases up to 26.01. Vendors that run MindsDB services that accept pickle input from untrusted sources are affected. No other products or versions are mentioned as impacted.

Risk and Exploitability

The CVSS score for this vulnerability is 5.3, indicating moderate severity. The EPSS score is not available, and the vulnerability is not listed in CISA’s KEV catalog. Based on the description, the attack is likely to be remote, requiring access to the public or exposed API endpoint that processes pickle data. An attacker who can send crafted pickle payloads can achieve remote code execution, granting full compromise of the affected system.

Generated by OpenCVE AI on May 4, 2026 at 01:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest official MindsDB release when a fix is available (upgrade past version 26.01).
  • Limit network exposure of the MindsDB API by firewalling the endpoint that processes pickle data so only trusted internal hosts can reach it.
  • Remove or disable the use of pickle.loads for untrusted input and replace it with a safe, validated deserialization mechanism or enforce strict input validation rules.

Generated by OpenCVE AI on May 4, 2026 at 01:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 04 May 2026 00:00:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in MindsDB up to 26.01. Affected is the function pickle.loads of the component Pickle Handler. The manipulation leads to deserialization. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title MindsDB Pickle pickle.loads deserialization
First Time appeared Mindsdb
Mindsdb mindsdb
Weaknesses CWE-20
CWE-502
CPEs cpe:2.3:a:mindsdb:mindsdb:*:*:*:*:*:*:*:*
Vendors & Products Mindsdb
Mindsdb mindsdb
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-03T23:45:16.137Z

Reserved: 2026-05-03T07:43:07.585Z

Link: CVE-2026-7712

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-04T00:16:39.990

Modified: 2026-05-04T00:16:39.990

Link: CVE-2026-7712

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-04T02:00:06Z

Weaknesses