Submit #579157: erdogant pypickle 1.1.5 Insecure Deserializationinfo

Titleerdogant pypickle 1.1.5 Insecure Deserialization
DescriptionIn the repository https://github.com/erdogant/pypickle, the function load() in pypickle.py uses Python’s pickle.load() to deserialize data from a file without validating or sanitizing the input. If an attacker supplies a malicious pickle file, they can execute arbitrary code when the file is loaded, resulting in a Remote Code Execution (RCE) vulnerability. This occurs because pickle.load() is inherently unsafe for loading untrusted data, as it can deserialize and invoke arbitrary Python objects, including system calls.
Source⚠️ https://github.com/erdogant/pypickle/issues/2
User
 esharmaji (UID 84358)
Submission05/16/2025 01:23 PM (2 months ago)
Moderation05/25/2025 03:42 PM (9 days later)
StatusAccepted
VulDB Entry310262 [erdogant pypickle up to 1.1.5 pypickle/pypickle.py load deserialization]
Points20

Do you want to use VulDB in your project?

Use the official API to access entries easily!