Vulnerability Description
picklescan before 0.0.21 does not treat 'pip' as an unsafe global. An attacker could craft a malicious model that uses Pickle to pull in a malicious PyPI package (hosted, for example, on pypi.org or GitHub) via `pip.main()`. Because pip is not a restricted global, the model, when scanned with picklescan, would pass security checks and appear to be safe, when it could instead prove to be problematic.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mmaitre314 | Picklescan | < 0.0.22 |
Related Weaknesses (CWE)
References
- https://github.com/mmaitre314/picklescan/commit/78ce704227c51f070c0c5fb4b466d92cPatch
- https://github.com/mmaitre314/picklescan/security/advisories/GHSA-655q-fx9r-782vExploitVendor Advisory
- https://www.sonatype.com/security-advisories/cve-2025-1716
FAQ
What is CVE-2025-1716?
CVE-2025-1716 is a vulnerability with a CVSS score of 9.8 (CRITICAL). picklescan before 0.0.21 does not treat 'pip' as an unsafe global. An attacker could craft a malicious model that uses Pickle to pull in a malicious PyPI package (hosted, for example, on pypi.org or G...
How severe is CVE-2025-1716?
CVE-2025-1716 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-1716?
Check the references section above for vendor advisories and patch information. Affected products include: Mmaitre314 Picklescan.