Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-29706 | Picklescan Bypass is Possible via File Extension Mismatch |
Github GHSA |
GHSA-jgw4-cr84-mqxg | Picklescan Bypass is Possible via File Extension Mismatch |
Thu, 02 Oct 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:mmaitre314:picklescan:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Thu, 18 Sep 2025 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mmaitre314
Mmaitre314 picklescan |
|
| Vendors & Products |
Mmaitre314
Mmaitre314 picklescan |
Wed, 17 Sep 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 17 Sep 2025 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An Improper Input Validation vulnerability in the scanning logic of mmaitre314 picklescan versions up to and including 0.0.30 allows a remote attacker to bypass pickle files security checks by supplying a standard pickle file with a PyTorch-related file extension. When the pickle file incorrectly considered safe is loaded, it can lead to the execution of malicious code. | |
| Title | PickleScan Security Bypass Using Misleading File Extension | |
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: JFROG
Published:
Updated: 2025-09-17T13:04:03.089Z
Reserved: 2025-09-09T11:07:33.136Z
Link: CVE-2025-10155
Updated: 2025-09-17T13:03:51.800Z
Status : Analyzed
Published: 2025-09-17T10:15:36.913
Modified: 2025-10-02T19:07:57.567
Link: CVE-2025-10155
No data.
OpenCVE Enrichment
Updated: 2025-09-18T12:41:53Z
EUVD
Github GHSA