A Protection Mechanism Failure vulnerability in mmaitre314 picklescan versions up to and including 0.0.30 allows a remote attacker to bypass the unsafe globals check. This is possible because the scanner performs an exact match for module names, allowing malicious payloads to be loaded via submodules of dangerous packages (e.g., 'asyncio.unix_events' instead of 'asyncio').
When the incorrectly considered safe file is loaded after scan, it can lead to the execution of malicious code.
Metrics
Affected Vendors & Products
References
History
Thu, 18 Sep 2025 12:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Mmaitre314
Mmaitre314 picklescan |
|
Vendors & Products |
Mmaitre314
Mmaitre314 picklescan |
Wed, 17 Sep 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 17 Sep 2025 11:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A Protection Mechanism Failure vulnerability in mmaitre314 picklescan versions up to and including 0.0.30 allows a remote attacker to bypass the unsafe globals check. This is possible because the scanner performs an exact match for module names, allowing malicious payloads to be loaded via submodules of dangerous packages (e.g., 'asyncio.unix_events' instead of 'asyncio'). When the incorrectly considered safe file is loaded after scan, it can lead to the execution of malicious code. | |
Title | PickleScan Bypasses Unsafe Globals Check Using Submodule Imports | |
Weaknesses | CWE-693 | |
References |
|
|
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: JFROG
Published: 2025-09-17T11:33:03.680Z
Updated: 2025-09-17T13:07:38.291Z
Reserved: 2025-09-09T11:07:37.837Z
Link: CVE-2025-10157

Updated: 2025-09-17T13:07:33.193Z

Status : Awaiting Analysis
Published: 2025-09-17T12:15:38.097
Modified: 2025-09-17T14:18:55.093
Link: CVE-2025-10157

No data.