Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-1716: CWE-184 Incomplete List of Disallowed Inputs in mmaitre314 picklescan

0
Medium
VulnerabilityCVE-2025-1716cvecve-2025-1716cwe-184
Published: Wed Feb 26 2025 (02/26/2025, 14:51:38 UTC)
Source: CVE Database V5
Vendor/Project: mmaitre314
Product: picklescan

Description

picklescan before 0.0.21 does not treat 'pip' as an unsafe global. An attacker could craft a malicious model that uses Pickle to pull in a malicious PyPI package (hosted, for example, on pypi.org or GitHub) via `pip.main()`. Because pip is not a restricted global, the model, when scanned with picklescan, would pass security checks and appear to be safe, when it could instead prove to be problematic.

AI-Powered Analysis

AILast updated: 12/30/2025, 23:50:43 UTC

Technical Analysis

CVE-2025-1716 is a vulnerability identified in the mmaitre314 picklescan tool, versions before 0.0.21, which is designed to scan Python Pickle serialized models for unsafe content. The core issue stems from an incomplete list of disallowed globals, specifically the omission of 'pip' as an unsafe global. Python's Pickle module allows arbitrary code execution during deserialization if unsafe globals are present. Attackers can craft malicious serialized models that invoke pip.main(), a function that can install arbitrary Python packages from PyPI or other repositories such as GitHub. Because picklescan does not flag 'pip' as unsafe, these malicious models can pass security scans, misleading users into believing the model is safe. This vulnerability is classified under CWE-184 (Incomplete List of Disallowed Inputs), indicating a failure to comprehensively restrict dangerous inputs. The CVSS 4.0 score is 5.3 (medium), reflecting network attack vector, low attack complexity, no privileges required, but requiring user interaction (scanning the malicious model). The vulnerability can lead to remote code execution during the scanning process, potentially compromising the scanning environment. No patches or fixes were linked at the time of disclosure, and no known exploits are reported in the wild. This vulnerability highlights the risks of insufficient input validation in security tools that analyze serialized data, especially in machine learning workflows where Pickle is common.

Potential Impact

For European organizations, the impact of CVE-2025-1716 can be significant in environments where picklescan is used to validate machine learning models before deployment. Successful exploitation could lead to arbitrary code execution on systems performing the scan, potentially compromising build pipelines, continuous integration environments, or production servers. This could result in unauthorized access, data theft, or further malware deployment. Organizations relying on Python-based ML workflows and automated security scanning are at risk of supply chain compromise through malicious model uploads. The medium severity score reflects that while exploitation requires user interaction (scanning the malicious model), the lack of privilege requirements and network attack vector make it feasible in environments where untrusted models are scanned. The vulnerability could disrupt trust in ML model validation processes and introduce risks to data confidentiality and system integrity. European sectors with high adoption of Python ML tools, such as finance, automotive, and research institutions, may face elevated risks.

Mitigation Recommendations

To mitigate CVE-2025-1716, European organizations should immediately upgrade picklescan to version 0.0.21 or later, where 'pip' is correctly treated as an unsafe global. Until patches are applied, organizations should avoid scanning untrusted or third-party Pickle models with vulnerable picklescan versions. Implement strict model provenance and validation policies to reduce the risk of malicious inputs. Consider sandboxing the scanning environment to limit the impact of potential code execution during scans. Additionally, monitor network traffic and system logs for unusual pip activity or package installations triggered during scanning. Security teams should review and harden CI/CD pipelines that incorporate picklescan to prevent exploitation. Finally, raise awareness among data scientists and developers about the risks of deserializing untrusted Pickle data and encourage the use of safer serialization formats where possible.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Sonatype
Date Reserved
2025-02-26T12:08:39.343Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695450bedb813ff03e2bf8f4

Added to database: 12/30/2025, 10:22:54 PM

Last enriched: 12/30/2025, 11:50:43 PM

Last updated: 2/6/2026, 5:27:29 AM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats