CVSS Score: 9.8 Published: 2025-12-30 Full Report: https://cvereports.com/reports/GHSA-46h3-79wf-xr6c
A critical bypass in the picklescan security scanner allowing remote code execution via the Python C-implementation module '_operator'.
picklescan, a tool designed to detect malicious Python pickles, failed to block the C-based _operator module. By using _operator.attrgetter instead of the blocked operator.attrgetter, attackers can bypass the scanner and achieve full RCE on systems attempting to verify untrusted serialized data.
- CWE: CWE-502 (Deserialization of Untrusted Data)
- CVSS: 9.8 (Critical)
- Attack Vector: Network / Local (via File)
- Impact: Remote Code Execution (RCE)
- Key Component: _operator (Python C-Module)
- Exploit Status: PoC Available
- picklescan < 0.0.34
- ML pipelines using picklescan
- Model repositories validating PyTorch files
- picklescan: < 0.0.34 (Fixed in:
0.0.34)
- Update picklescan to v0.0.34+
- Migrate from Pickle to Safetensors or ONNX
- Sandboxing deserialization processes
Remediation Steps:
- Run
pip install --upgrade picklescan - Audit all pipelines accepting serialized data for 'pickle' usage
- Verify that
picklescanis part of a defense-in-depth strategy, not the sole control
Generated by CVEReports - Automated Vulnerability Intelligence