A Protection Mechanism Failure vulnerability in mmaitre314 picklescan versions up to and including 0.0.30 allows a remote attacker to bypass the unsafe globals check. This is possible because the scanner performs an exact match for module names, allowing malicious payloads to be loaded via submodules of dangerous packages (e.g., 'asyncio.unix_events' instead of 'asyncio').
When the incorrectly considered safe file is loaded after scan, it can lead to the execution of malicious code.
References
Configurations
History
02 Oct 2025, 18:59
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
CPE | cpe:2.3:a:mmaitre314:picklescan:*:*:*:*:*:*:*:* | |
First Time |
Mmaitre314
Mmaitre314 picklescan |
|
References | () https://github.com/mmaitre314/picklescan/blob/2a8383cfeb4158567f9770d86597300c9e508d0f/src/picklescan/scanner.py#L309 - Product | |
References | () https://github.com/mmaitre314/picklescan/security/advisories/GHSA-f7qq-56ww-84cr - Exploit, Vendor Advisory | |
References | () https://huggingface.co/iluem/linux_pkl/resolve/main/asyncio_asyncio_unix_events___UnixSubprocessTransport__start.pkl - Broken Link |
17 Sep 2025, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-17 12:15
Updated : 2025-10-02 18:59
NVD link : CVE-2025-10157
Mitre link : CVE-2025-10157
CVE.ORG link : CVE-2025-10157
JSON object : View
Products Affected
mmaitre314
- picklescan
CWE
CWE-693
Protection Mechanism Failure