CVE-2025-10155

An Improper Input Validation vulnerability in the scanning logic of mmaitre314 picklescan versions up to and including 0.0.30 allows a remote attacker to bypass pickle files security checks by supplying a standard pickle file with a PyTorch-related file extension. When the pickle file incorrectly considered safe is loaded, it can lead to the execution of malicious code.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mmaitre314:picklescan:*:*:*:*:*:*:*:*

History

02 Oct 2025, 19:07

Type Values Removed Values Added
References () https://github.com/mmaitre314/picklescan/blob/58983e1c20973ac42f2df7ff15d7c8cd32f9b688/src/picklescan/scanner.py#L463 - () https://github.com/mmaitre314/picklescan/blob/58983e1c20973ac42f2df7ff15d7c8cd32f9b688/src/picklescan/scanner.py#L463 - Product
References () https://github.com/mmaitre314/picklescan/security/advisories/GHSA-jgw4-cr84-mqxg - () https://github.com/mmaitre314/picklescan/security/advisories/GHSA-jgw4-cr84-mqxg - Exploit, Vendor Advisory, Patch
CPE cpe:2.3:a:mmaitre314:picklescan:*:*:*:*:*:*:*:*
First Time Mmaitre314
Mmaitre314 picklescan
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

17 Sep 2025, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-17 10:15

Updated : 2025-10-02 19:07


NVD link : CVE-2025-10155

Mitre link : CVE-2025-10155

CVE.ORG link : CVE-2025-10155


JSON object : View

Products Affected

mmaitre314

  • picklescan
CWE
CWE-20

Improper Input Validation