CVE-2025-62515

CRITICAL LAB

Pypi Pyquokka - Insecure Deserialization

Title source: rule

Description

pyquokka is a framework for making data lakes work for time series. In versions 0.3.1 and prior, the FlightServer class directly uses pickle.loads() to deserialize action bodies received from Flight clients without any sanitization or validation in the do_action() method. The vulnerable code is located in pyquokka/flight.py at line 283 where arbitrary data from Flight clients is directly passed to pickle.loads(). When FlightServer is configured to listen on 0.0.0.0, this allows attackers across the entire network to perform arbitrary remote code execution by sending malicious pickled payloads through the set_configs action. Additional vulnerability points exist in the cache_garbage_collect, do_put, and do_get functions where pickle.loads is used to deserialize untrusted remote data.

Exploits (1)

github WORKING POC 1 stars
by exploitintel · pythonpoc
https://github.com/exploitintel/eip-pocs-and-cves/tree/main/CVE-2025-62515

Scores

CVSS v3 9.8
EPSS 0.0055
EPSS Percentile 67.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Lab Environment

Lab screenshot
patched vulnerable
docker pull ghcr.io/exploitintel/cve-2025-62515-vulnerable:latest
All Labs GitHub

Classification

CWE
CWE-502
Status draft

Affected Products (1)

pypi/pyquokka PyPI

Timeline

Published Oct 17, 2025
Tracked Since Feb 18, 2026