An Improper Input Validation vulnerability in the scanning logic of mmaitre314 picklescan versions up to and including 0.0.30 allows a remote attacker to bypass pickle files security checks by supplying a standard pickle file with a PyTorch-related file extension. When the pickle file incorrectly considered safe is loaded, it can lead to the execution of malicious code.
References
| Link | Resource |
|---|---|
| https://github.com/mmaitre314/picklescan/blob/58983e1c20973ac42f2df7ff15d7c8cd32f9b688/src/picklescan/scanner.py#L463 | Product |
| https://github.com/mmaitre314/picklescan/security/advisories/GHSA-jgw4-cr84-mqxg | Exploit Vendor Advisory Patch |
Configurations
History
No history.
Information
Published : 2025-09-17 10:15
Updated : 2025-10-02 19:07
NVD link : CVE-2025-10155
Mitre link : CVE-2025-10155
CVE.ORG link : CVE-2025-10155
JSON object : View
Products Affected
mmaitre314
- picklescan
CWE
CWE-20
Improper Input Validation
