Insecure Global Handling in Picklescan Affects Python Package Security
CVE-2025-1716
5.3MEDIUM
Key Information:
- Vendor
- Mmaitre314
- Status
- Picklescan
- Vendor
- CVE Published:
- 26 February 2025
Summary
Picklescan versions earlier than 0.0.21 have a critical security flaw where the 'pip' command is not treated as an unsafe global. An attacker can exploit this vulnerability by crafting a malicious model that utilizes Pickle, enabling it to pull in harmful packages from external sources like PyPI or GitHub through pip.main(). This oversight allows the model to pass security checks during scanning, falsely appearing secure while potentially executing harmful operations.
Affected Version(s)
picklescan 0.0.1 <= 0.0.20
References
CVSS V4
Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Trevor Madge (@madgetr) of Sonatype