Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2025-1716
Modified
More InfoOfficial Page
Source-103e4ec9-0a87-450b-af77-479448ddef11
View Known Exploited Vulnerability (KEV) details
Published At-26 Feb, 2025 | 15:15
Updated At-29 Dec, 2025 | 15:16

picklescan before 0.0.21 does not treat 'pip' as an unsafe global. An attacker could craft a malicious model that uses Pickle to pull in a malicious PyPI package (hosted, for example, on pypi.org or GitHub) via `pip.main()`. Because pip is not a restricted global, the model, when scanned with picklescan, would pass security checks and appear to be safe, when it could instead prove to be problematic.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.05.3MEDIUM
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Primary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 4.0
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Primary
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CPE Matches

mmaitre314
mmaitre314
>>picklescan>>Versions before 0.0.22(exclusive)
cpe:2.3:a:mmaitre314:picklescan:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-184Secondary103e4ec9-0a87-450b-af77-479448ddef11
CWE ID: CWE-184
Type: Secondary
Source: 103e4ec9-0a87-450b-af77-479448ddef11
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/mmaitre314/picklescan/commit/78ce704227c51f070c0c5fb4b466d92c62a7aa3d103e4ec9-0a87-450b-af77-479448ddef11
Patch
https://github.com/mmaitre314/picklescan/security/advisories/GHSA-655q-fx9r-782v103e4ec9-0a87-450b-af77-479448ddef11
Exploit
Vendor Advisory
https://www.sonatype.com/security-advisories/cve-2025-1716103e4ec9-0a87-450b-af77-479448ddef11
N/A
Hyperlink: https://github.com/mmaitre314/picklescan/commit/78ce704227c51f070c0c5fb4b466d92c62a7aa3d
Source: 103e4ec9-0a87-450b-af77-479448ddef11
Resource:
Patch
Hyperlink: https://github.com/mmaitre314/picklescan/security/advisories/GHSA-655q-fx9r-782v
Source: 103e4ec9-0a87-450b-af77-479448ddef11
Resource:
Exploit
Vendor Advisory
Hyperlink: https://www.sonatype.com/security-advisories/cve-2025-1716
Source: 103e4ec9-0a87-450b-af77-479448ddef11
Resource: N/A
Change History
0Changes found

Details not found