CVE-2025-1716

CRITICAL

picklescan <0.0.21 - Code Injection

Title source: llm

Description

picklescan before 0.0.21 does not treat 'pip' as an unsafe global. An attacker could craft a malicious model that uses Pickle to pull in a malicious PyPI package (hosted, for example, on pypi.org or GitHub) via `pip.main()`. Because pip is not a restricted global, the model, when scanned with picklescan, would pass security checks and appear to be safe, when it could instead prove to be problematic.

Exploits (4)

github WORKING POC 2 stars
by adminlove520 · pythonpoc
https://github.com/adminlove520/CVE-Poc_All_in_One/tree/main/2025/CVE-2025-1716
nomisec TROJAN
by danigil · poc
https://github.com/danigil/cve-2025-1716
nomisec WORKING POC
by 0xDaeras · poc
https://github.com/0xDaeras/POC_CVE-2025-1716
nomisec TROJAN
by xp3s · poc
https://github.com/xp3s/poc_CVE-2025-1716

Scores

CVSS v3 9.8
EPSS 0.1625
EPSS Percentile 94.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-184
Status published
Products (2)
mmaitre314/picklescan < 0.0.22
pypi/picklescan 0 - 0.0.22PyPI
Published Feb 26, 2025
Tracked Since Feb 18, 2026