Insecure Global Handling in Picklescan Affects Python Package Security
CVE-2025-1716
5.3MEDIUM
What is CVE-2025-1716?
Picklescan versions earlier than 0.0.21 have a critical security flaw where the 'pip' command is not treated as an unsafe global. An attacker can exploit this vulnerability by crafting a malicious model that utilizes Pickle, enabling it to pull in harmful packages from external sources like PyPI or GitHub through pip.main(). This oversight allows the model to pass security checks during scanning, falsely appearing secure while potentially executing harmful operations.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
picklescan 0.0.1 <= 0.0.20
References
CVSS V4
Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Trevor Madge (@madgetr) of Sonatype
