CVE-2025-1716: CWE-184 Incomplete List of Disallowed Inputs in mmaitre314 picklescan
picklescan before 0.0.21 does not treat 'pip' as an unsafe global. An attacker could craft a malicious model that uses Pickle to pull in a malicious PyPI package (hosted, for example, on pypi.org or GitHub) via `pip.main()`. Because pip is not a restricted global, the model, when scanned with picklescan, would pass security checks and appear to be safe, when it could instead prove to be problematic.
AI Analysis
Technical Summary
CVE-2025-1716 is a vulnerability identified in the mmaitre314 picklescan tool, versions before 0.0.21, which is designed to scan Python Pickle serialized models for unsafe content. The core issue stems from an incomplete list of disallowed globals, specifically the omission of 'pip' as an unsafe global. Python's Pickle module allows arbitrary code execution during deserialization if unsafe globals are present. Attackers can craft malicious serialized models that invoke pip.main(), a function that can install arbitrary Python packages from PyPI or other repositories such as GitHub. Because picklescan does not flag 'pip' as unsafe, these malicious models can pass security scans, misleading users into believing the model is safe. This vulnerability is classified under CWE-184 (Incomplete List of Disallowed Inputs), indicating a failure to comprehensively restrict dangerous inputs. The CVSS 4.0 score is 5.3 (medium), reflecting network attack vector, low attack complexity, no privileges required, but requiring user interaction (scanning the malicious model). The vulnerability can lead to remote code execution during the scanning process, potentially compromising the scanning environment. No patches or fixes were linked at the time of disclosure, and no known exploits are reported in the wild. This vulnerability highlights the risks of insufficient input validation in security tools that analyze serialized data, especially in machine learning workflows where Pickle is common.
Potential Impact
For European organizations, the impact of CVE-2025-1716 can be significant in environments where picklescan is used to validate machine learning models before deployment. Successful exploitation could lead to arbitrary code execution on systems performing the scan, potentially compromising build pipelines, continuous integration environments, or production servers. This could result in unauthorized access, data theft, or further malware deployment. Organizations relying on Python-based ML workflows and automated security scanning are at risk of supply chain compromise through malicious model uploads. The medium severity score reflects that while exploitation requires user interaction (scanning the malicious model), the lack of privilege requirements and network attack vector make it feasible in environments where untrusted models are scanned. The vulnerability could disrupt trust in ML model validation processes and introduce risks to data confidentiality and system integrity. European sectors with high adoption of Python ML tools, such as finance, automotive, and research institutions, may face elevated risks.
Mitigation Recommendations
To mitigate CVE-2025-1716, European organizations should immediately upgrade picklescan to version 0.0.21 or later, where 'pip' is correctly treated as an unsafe global. Until patches are applied, organizations should avoid scanning untrusted or third-party Pickle models with vulnerable picklescan versions. Implement strict model provenance and validation policies to reduce the risk of malicious inputs. Consider sandboxing the scanning environment to limit the impact of potential code execution during scans. Additionally, monitor network traffic and system logs for unusual pip activity or package installations triggered during scanning. Security teams should review and harden CI/CD pipelines that incorporate picklescan to prevent exploitation. Finally, raise awareness among data scientists and developers about the risks of deserializing untrusted Pickle data and encourage the use of safer serialization formats where possible.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Belgium, Italy
CVE-2025-1716: CWE-184 Incomplete List of Disallowed Inputs in mmaitre314 picklescan
Description
picklescan before 0.0.21 does not treat 'pip' as an unsafe global. An attacker could craft a malicious model that uses Pickle to pull in a malicious PyPI package (hosted, for example, on pypi.org or GitHub) via `pip.main()`. Because pip is not a restricted global, the model, when scanned with picklescan, would pass security checks and appear to be safe, when it could instead prove to be problematic.
AI-Powered Analysis
Technical Analysis
CVE-2025-1716 is a vulnerability identified in the mmaitre314 picklescan tool, versions before 0.0.21, which is designed to scan Python Pickle serialized models for unsafe content. The core issue stems from an incomplete list of disallowed globals, specifically the omission of 'pip' as an unsafe global. Python's Pickle module allows arbitrary code execution during deserialization if unsafe globals are present. Attackers can craft malicious serialized models that invoke pip.main(), a function that can install arbitrary Python packages from PyPI or other repositories such as GitHub. Because picklescan does not flag 'pip' as unsafe, these malicious models can pass security scans, misleading users into believing the model is safe. This vulnerability is classified under CWE-184 (Incomplete List of Disallowed Inputs), indicating a failure to comprehensively restrict dangerous inputs. The CVSS 4.0 score is 5.3 (medium), reflecting network attack vector, low attack complexity, no privileges required, but requiring user interaction (scanning the malicious model). The vulnerability can lead to remote code execution during the scanning process, potentially compromising the scanning environment. No patches or fixes were linked at the time of disclosure, and no known exploits are reported in the wild. This vulnerability highlights the risks of insufficient input validation in security tools that analyze serialized data, especially in machine learning workflows where Pickle is common.
Potential Impact
For European organizations, the impact of CVE-2025-1716 can be significant in environments where picklescan is used to validate machine learning models before deployment. Successful exploitation could lead to arbitrary code execution on systems performing the scan, potentially compromising build pipelines, continuous integration environments, or production servers. This could result in unauthorized access, data theft, or further malware deployment. Organizations relying on Python-based ML workflows and automated security scanning are at risk of supply chain compromise through malicious model uploads. The medium severity score reflects that while exploitation requires user interaction (scanning the malicious model), the lack of privilege requirements and network attack vector make it feasible in environments where untrusted models are scanned. The vulnerability could disrupt trust in ML model validation processes and introduce risks to data confidentiality and system integrity. European sectors with high adoption of Python ML tools, such as finance, automotive, and research institutions, may face elevated risks.
Mitigation Recommendations
To mitigate CVE-2025-1716, European organizations should immediately upgrade picklescan to version 0.0.21 or later, where 'pip' is correctly treated as an unsafe global. Until patches are applied, organizations should avoid scanning untrusted or third-party Pickle models with vulnerable picklescan versions. Implement strict model provenance and validation policies to reduce the risk of malicious inputs. Consider sandboxing the scanning environment to limit the impact of potential code execution during scans. Additionally, monitor network traffic and system logs for unusual pip activity or package installations triggered during scanning. Security teams should review and harden CI/CD pipelines that incorporate picklescan to prevent exploitation. Finally, raise awareness among data scientists and developers about the risks of deserializing untrusted Pickle data and encourage the use of safer serialization formats where possible.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Sonatype
- Date Reserved
- 2025-02-26T12:08:39.343Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 695450bedb813ff03e2bf8f4
Added to database: 12/30/2025, 10:22:54 PM
Last enriched: 12/30/2025, 11:50:43 PM
Last updated: 2/7/2026, 7:41:45 AM
Views: 36
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2076: Improper Authorization in yeqifu warehouse
MediumCVE-2025-15491: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Post Slides
HighCVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-12803: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in boldthemes Bold Page Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.