Remote Code Execution Vulnerability in Pipecat Open-Source Framework
CVE-2025-62373

9.8CRITICAL

Key Information:

Vendor

Pipecat-ai

Status
Vendor
CVE Published:
23 April 2026

What is CVE-2025-62373?

The Pipecat framework has a vulnerability in its optional LivekitFrameSerializer class, which allows remote code execution through insecure deserialization of data received from WebSocket clients. Specifically, the deserialize() method utilizes Python's pickle.loads() without proper data validation. This exposes servers utilizing the vulnerable serializer to potential attacks, enabling malicious clients to execute arbitrary code by sending crafted payloads. To mitigate this vulnerability, users are advised to avoid using the deprecated LivekitFrameSerializer, secure their network configurations, and upgrade to version 0.0.94 or above, implementing recommended alternatives for LiveKit functionality.

Affected Version(s)

pipecat >= 0.0.41, < 0.0.94

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.