- Description
- An Improper Input Validation vulnerability in the scanning logic of mmaitre314 picklescan versions up to and including 0.0.30 allows a remote attacker to bypass pickle files security checks by supplying a standard pickle file with a PyTorch-related file extension. When the pickle file incorrectly considered safe is loaded, it can lead to the execution of malicious code.
- Source
- reefs@jfrog.com
- NVD status
- Analyzed
- Products
- picklescan
CVSS 4.0
- Type
- Secondary
- Base score
- 9.3
- Impact score
- -
- Exploitability score
- -
- Vector string
- CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
- Severity
- CRITICAL
CVSS 3.1
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
- reefs@jfrog.com
- CWE-20
- Hype score
- Not currently trending
Vulnerability Alert — Picklescan Three critical flaws (CVE-2025-10155, 10156, 10157) allow malicious PyTorch models to bypass Picklescan and execute arbitrary code, creating supply chain risk. Patched in Picklescan 0.0.31 — update immediately. https://t.co/G75iLyBifZ
@CloneSystemsInc
3 Dec 2025
39 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-10155 An Improper Input Validation vulnerability in the scanning logic of mmaitre314 picklescan versions up to and including 0.0.30 allows a remote attacker to bypass pickl… https://t.co/4D4HJ07vg2
@CVEnew
17 Sept 2025
248 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 New vulnerability: CVE-2025-10155 affects picklescan <0.0.30. Allows remote code execution via malicious .pt files. Patch ASAP! 🔒 #CyberSecurity #Infosec
@Thendcrack
17 Sept 2025
25 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
🚨 Nueva vulnerabilidad: CVE-2025-10155 afecta a picklescan <0.0.30. Permite ejecución remota de código al cargar archivos .pt maliciosos. ¡Actualiza ya! 🔒 #CyberSecurity #Infosec
@Thendcrack
17 Sept 2025
19 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
🚨 CRITICAL: CVE-2025-10155 in mmaitre314 picklescan (≤0.0.30) lets attackers bypass security and trigger remote code execution via manipulated pickle files. Stop use & isolate affected systems! Details: https://t.co/NhyJ1X7Sgg... https://t.co/vzY87jQBbk
@offseq
17 Sept 2025
42 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[CVE-2025-10155: CRITICAL] Vulnerability in mmaitre314 picklescan allows remote attackers to execute malicious code by bypassing security checks with a PyTorch-related file extension in pickle files.#cve,CVE-2025-10155,#cybersecurity https://t.co/sQxeknr39C https://t.co/HxPo2t1bW
@CveFindCom
17 Sept 2025
51 Impressions
0 Retweets
0 Likes
1 Bookmark
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mmaitre314:picklescan:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C1ABB08D-CB91-4CA6-9EA3-A77D8B8484E0",
"versionEndExcluding": "0.0.31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]