Vulnerability Description
DataChain is a Python-based AI-data warehouse for transforming and analyzing unstructured data. Versions 0.34.1 and below allow for deseriaization of untrusted data because of the way the DataChain library reads serialized objects from environment variables (such as DATACHAIN__METASTORE and DATACHAIN__WAREHOUSE) in the loader.py module. An attacker with the ability to set these environment variables can trigger code execution when the application loads. This issue is fixed in version 0.34.2.
CVSS Score
LOW
Related Weaknesses (CWE)
References
- https://github.com/iterative/datachain/commit/914b95610620d50c8d9bee506ccbfa7d4d
- https://github.com/iterative/datachain/pull/1358
- https://github.com/iterative/datachain/security/advisories/GHSA-6px8-mr29-cj4r
FAQ
What is CVE-2025-61677?
CVE-2025-61677 is a vulnerability with a CVSS score of 2.5 (LOW). DataChain is a Python-based AI-data warehouse for transforming and analyzing unstructured data. Versions 0.34.1 and below allow for deseriaization of untrusted data because of the way the DataChain li...
How severe is CVE-2025-61677?
CVE-2025-61677 has been rated LOW with a CVSS base score of 2.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-61677?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.