An Improper Input Validation vulnerability in the scanning logic of mmaitre314 picklescan versions up to and including 0.0.30 allows a remote attacker to bypass pickle files security checks by supplying a standard pickle file with a PyTorch-related file extension. When the pickle file incorrectly considered safe is loaded, it can lead to the execution of malicious code.
History

Thu, 18 Sep 2025 12:45:00 +0000

Type Values Removed Values Added
First Time appeared Mmaitre314
Mmaitre314 picklescan
Vendors & Products Mmaitre314
Mmaitre314 picklescan

Wed, 17 Sep 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 17 Sep 2025 10:00:00 +0000

Type Values Removed Values Added
Description An Improper Input Validation vulnerability in the scanning logic of mmaitre314 picklescan versions up to and including 0.0.30 allows a remote attacker to bypass pickle files security checks by supplying a standard pickle file with a PyTorch-related file extension. When the pickle file incorrectly considered safe is loaded, it can lead to the execution of malicious code.
Title PickleScan Security Bypass Using Misleading File Extension
Weaknesses CWE-20
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: JFROG

Published: 2025-09-17T09:38:15.056Z

Updated: 2025-09-17T13:04:03.089Z

Reserved: 2025-09-09T11:07:33.136Z

Link: CVE-2025-10155

cve-icon Vulnrichment

Updated: 2025-09-17T13:03:51.800Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-09-17T10:15:36.913

Modified: 2025-09-17T14:18:55.093

Link: CVE-2025-10155

cve-icon Redhat

No data.