Insecure Global Handling in Picklescan Affects Python Package Security
CVE-2025-1716

5.3MEDIUM

Key Information:

Vendor
Mmaitre314
Status
Picklescan
Vendor
CVE Published:
26 February 2025

Summary

Picklescan versions earlier than 0.0.21 have a critical security flaw where the 'pip' command is not treated as an unsafe global. An attacker can exploit this vulnerability by crafting a malicious model that utilizes Pickle, enabling it to pull in harmful packages from external sources like PyPI or GitHub through pip.main(). This oversight allows the model to pass security checks during scanning, falsely appearing secure while potentially executing harmful operations.

Affected Version(s)

picklescan 0.0.1 <= 0.0.20

References

CVSS V4

Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Trevor Madge (@madgetr) of Sonatype
.