Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25359: Deserialization of Untrusted Data in rascals Pendulum

0
Unknown
VulnerabilityCVE-2026-25359cvecve-2026-25359
Published: Wed Mar 25 2026 (03/25/2026, 16:14:45 UTC)
Source: CVE Database V5
Vendor/Project: rascals
Product: Pendulum

Description

Deserialization of Untrusted Data vulnerability in rascals Pendulum pendulum allows Object Injection.This issue affects Pendulum: from n/a through < 3.1.5.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/25/2026, 18:21:43 UTC

Technical Analysis

CVE-2026-25359 identifies a critical security vulnerability in the rascals Pendulum library, a Python package commonly used for date and time manipulation. The vulnerability arises from unsafe deserialization of untrusted data, which allows an attacker to perform object injection attacks. Deserialization is the process of reconstructing objects from data formats like JSON or pickle; if this process is not securely handled, it can lead to execution of arbitrary code or manipulation of program state. In Pendulum versions prior to 3.1.5, the deserialization mechanism does not properly validate or sanitize input, enabling attackers to craft malicious payloads that, when deserialized, can inject arbitrary objects into the application. This can lead to remote code execution, privilege escalation, or data corruption depending on the context in which Pendulum is used. Although no exploits have been reported in the wild yet, the vulnerability is publicly disclosed and patched in version 3.1.5. The lack of a CVSS score suggests the need for a manual severity assessment. The vulnerability affects any application that uses Pendulum for deserialization of untrusted input, which is a common anti-pattern but still possible in some development scenarios. The vulnerability was reserved in early 2026 and published in March 2026, indicating recent discovery and disclosure.

Potential Impact

The impact of CVE-2026-25359 can be significant for organizations that use Pendulum in environments where untrusted data might be deserialized. Exploitation can lead to remote code execution, allowing attackers to run arbitrary code within the context of the vulnerable application, potentially leading to full system compromise. Confidentiality may be breached if sensitive data is accessed or exfiltrated. Integrity can be compromised through unauthorized data manipulation or injection of malicious objects. Availability could also be affected if the injected code disrupts normal application operations or causes crashes. Since Pendulum is a widely used Python library, especially in web applications, data processing, and automation scripts, the vulnerability could affect a broad range of industries including technology, finance, healthcare, and government. The absence of authentication or user interaction requirements makes exploitation easier, increasing the risk profile. However, the actual impact depends on how Pendulum is used within the application and whether untrusted data is deserialized.

Mitigation Recommendations

To mitigate CVE-2026-25359, organizations should immediately upgrade Pendulum to version 3.1.5 or later, where the vulnerability has been addressed. Developers must audit their codebases to identify any instances where Pendulum deserializes data from untrusted sources and refactor these to avoid unsafe deserialization. Employ strict input validation and sanitization before deserialization. Where possible, replace deserialization with safer data handling methods such as using JSON with strict schemas or other secure serialization formats. Implement runtime protections such as application whitelisting and sandboxing to limit the impact of potential exploitation. Monitor application logs for unusual deserialization activities or errors. Educate development teams about the risks of deserializing untrusted data and enforce secure coding practices. Finally, maintain an up-to-date inventory of dependencies and apply security patches promptly.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2026-02-02T12:52:48.541Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69c41169f4197a8e3b6d65ed

Added to database: 3/25/2026, 4:46:33 PM

Last enriched: 3/25/2026, 6:21:43 PM

Last updated: 3/26/2026, 5:35:26 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses