Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-1889: CWE-646 Reliance on File Name or Extension of Externally-Supplied File in mmaitre314 picklescan

0
Medium
VulnerabilityCVE-2025-1889cvecve-2025-1889cwe-646
Published: Mon Mar 03 2025 (03/03/2025, 18:38:10 UTC)
Source: CVE Database V5
Vendor/Project: mmaitre314
Product: picklescan

Description

picklescan before 0.0.22 only considers standard pickle file extensions in the scope for its vulnerability scan. An attacker could craft a malicious model that uses Pickle and include a malicious pickle file with a non-standard file extension. Because the malicious pickle file inclusion is not considered as part of the scope of picklescan, the file would pass security checks and appear to be safe, when it could instead prove to be problematic.

AI-Powered Analysis

AILast updated: 12/30/2025, 23:51:05 UTC

Technical Analysis

CVE-2025-1889 identifies a vulnerability in the mmaitre314 picklescan tool, specifically versions prior to 0.0.22. Picklescan is designed to scan pickle files for malicious content to prevent code execution attacks via Python's pickle serialization format. The vulnerability arises because picklescan only considers files with standard pickle file extensions (e.g., .pkl, .pickle) when performing its security scans. An attacker can craft a malicious pickle payload embedded in a file with a non-standard or unexpected file extension, which picklescan does not scan. As a result, the malicious file bypasses the security checks and can be loaded by applications trusting picklescan's validation, leading to arbitrary code execution or other malicious actions. The weakness is classified under CWE-646, which relates to reliance on file names or extensions for security decisions. The CVSS 4.0 vector indicates the attack can be performed remotely over the network without privileges but requires user interaction (e.g., opening or loading the malicious file). The vulnerability impacts the confidentiality and integrity of affected systems by enabling execution of unauthorized code. No patches or exploit code are currently publicly available, but the issue is recognized and fixed in picklescan version 0.0.22. This vulnerability is particularly relevant in environments where pickle files are used extensively, such as machine learning model deployment and data science workflows, and where picklescan is used as a security measure to prevent malicious pickle payloads.

Potential Impact

For European organizations, the impact of CVE-2025-1889 is primarily on the security of machine learning and data science environments that utilize Python pickle files and rely on picklescan for security scanning. Successful exploitation could lead to arbitrary code execution, compromising the confidentiality and integrity of sensitive data and systems. This could result in unauthorized data access, data manipulation, or further lateral movement within networks. Although the vulnerability does not directly affect system availability, the downstream effects of a compromise could disrupt operations or lead to data breaches. Organizations in sectors with high reliance on AI and data science, such as finance, healthcare, and manufacturing, may face increased risk. The requirement for user interaction means social engineering or phishing could be used to deliver the malicious file. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers often target unpatched systems. Failure to update picklescan or implement additional validation controls could leave organizations exposed to this vulnerability.

Mitigation Recommendations

1. Upgrade picklescan to version 0.0.22 or later, where this vulnerability is fixed by expanding the scope of file extensions scanned. 2. Implement additional validation mechanisms that do not rely solely on file extensions, such as inspecting file headers or magic bytes to confirm file type before processing. 3. Employ strict input validation and sandboxing when loading pickle files to limit the impact of potential malicious payloads. 4. Educate users and developers about the risks of opening pickle files from untrusted sources, emphasizing the need for caution with files having non-standard extensions. 5. Integrate multi-layered security controls such as endpoint detection and response (EDR) solutions to detect anomalous behavior resulting from malicious pickle execution. 6. Regularly audit and monitor machine learning pipelines and data ingestion workflows for unauthorized or suspicious files. 7. Consider alternative serialization formats with safer security profiles where feasible, such as JSON or protobuf, to reduce reliance on pickle files. 8. Establish incident response procedures specific to code execution attacks originating from serialized data files.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Sonatype
Date Reserved
2025-03-03T15:51:41.860Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695450bedb813ff03e2bf8f9

Added to database: 12/30/2025, 10:22:54 PM

Last enriched: 12/30/2025, 11:51:05 PM

Last updated: 2/7/2026, 8:43:32 PM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats