Remote Code Execution Vulnerability in Python-SocketIO by Miguel Grinberg
CVE-2025-61765

6.4MEDIUM

Key Information:

Vendor
CVE Published:
6 October 2025

What is CVE-2025-61765?

The python-socketio library, a Python implementation for real-time communication, contains a remote code execution vulnerability in its versions prior to 5.14.0. This issue arises from unsafe deserialization of messages encoded with Python's pickle module, particularly in configurations where a message queue backend (such as Redis) is used for inter-server communication. An attacker who gains access to the message queue can inject a malicious pickle payload that will be executed when deserialized by the server, potentially compromising the security context and privileges of the socket server process. To mitigate this risk, it is critical to secure the message queue and upgrade to version 5.14.0 or newer, which replaces the pickle module with a more secure JSON encoding for inter-server messages.

Affected Version(s)

python-socketio >= 0.8.0, < 5.14.0

References

CVSS V3.1

Score:
6.4
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-61765 : Remote Code Execution Vulnerability in Python-SocketIO by Miguel Grinberg