Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-r7v6-mfhq-g3m2 | Fickling has Code Injection vulnerability via pty.spawn() |
Fri, 02 Jan 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:trailofbits:fickling:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Tue, 16 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 16 Dec 2025 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Trailofbits
Trailofbits fickling |
|
| Vendors & Products |
Trailofbits
Trailofbits fickling |
Tue, 16 Dec 2025 00:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Fickling is a Python pickling decompiler and static analyzer. Versions prior to 0.1.6 had a bypass caused by `pty` missing from the block list of unsafe module imports. This led to unsafe pickles based on `pty.spawn()` being incorrectly flagged as `LIKELY_SAFE`, and was fixed in version 0.1.6. This impacted any user or system that used Fickling to vet pickle files for security issues. | |
| Title | Fickling has Code Injection vulnerability via pty.spawn() | |
| Weaknesses | CWE-184 CWE-502 CWE-94 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-12-16T21:12:34.235Z
Reserved: 2025-12-11T20:30:54.927Z
Link: CVE-2025-67748
Updated: 2025-12-16T21:12:30.336Z
Status : Analyzed
Published: 2025-12-16T01:15:52.950
Modified: 2026-01-02T15:58:53.810
Link: CVE-2025-67748
No data.
OpenCVE Enrichment
Updated: 2025-12-16T20:45:31Z
Github GHSA