A vulnerability was found in erdogant pypickle up to 1.1.5. It has been classified as critical. This affects the function Save of the file pypickle/pypickle.py. The manipulation leads to improper authorization. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. Upgrading to version 2.0.0 is able to address this issue. The patch is named 14b4cae704a0bb4eb6723e238f25382d847a1917. It is recommended to upgrade the affected component.
References
Link | Resource |
---|---|
https://github.com/erdogant/pypickle/commit/14b4cae704a0bb4eb6723e238f25382d847a1917 | Patch |
https://github.com/erdogant/pypickle/issues/3 | Exploit Issue Tracking Vendor Advisory |
https://github.com/erdogant/pypickle/issues/3#issue-3070689116 | Exploit Issue Tracking Vendor Advisory |
https://github.com/erdogant/pypickle/issues/3#issuecomment-2888589652 | Exploit Issue Tracking Vendor Advisory |
https://github.com/erdogant/pypickle/releases/tag/2.0.0 | Release Notes |
https://vuldb.com/?ctiid.310263 | Permissions Required VDB Entry |
https://vuldb.com/?id.310263 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.579824 | Third Party Advisory VDB Entry |
https://github.com/erdogant/pypickle/issues/3 | Exploit Issue Tracking Vendor Advisory |
Configurations
History
03 Jun 2025, 15:43
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/erdogant/pypickle/commit/14b4cae704a0bb4eb6723e238f25382d847a1917 - Patch | |
References | () https://github.com/erdogant/pypickle/issues/3 - Exploit, Issue Tracking, Vendor Advisory | |
References | () https://github.com/erdogant/pypickle/issues/3#issue-3070689116 - Exploit, Issue Tracking, Vendor Advisory | |
References | () https://github.com/erdogant/pypickle/issues/3#issuecomment-2888589652 - Exploit, Issue Tracking, Vendor Advisory | |
References | () https://github.com/erdogant/pypickle/releases/tag/2.0.0 - Release Notes | |
References | () https://vuldb.com/?ctiid.310263 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.310263 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.579824 - Third Party Advisory, VDB Entry | |
CWE | NVD-CWE-Other | |
First Time |
Erdogant pypickle
Erdogant |
|
CPE | cpe:2.3:a:erdogant:pypickle:*:*:*:*:*:*:*:* |
28 May 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/erdogant/pypickle/issues/3 - |
28 May 2025, 15:01
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
26 May 2025, 08:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-26 08:15
Updated : 2025-06-03 15:43
NVD link : CVE-2025-5175
Mitre link : CVE-2025-5175
CVE.ORG link : CVE-2025-5175
JSON object : View
Products Affected
erdogant
- pypickle
CWE