CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



GHSA-955R-X9J8-7RHH
9.3

Pickle Me Pwned: Bypassing Picklescan with a C-Module Blind Spot

Amit Schendel
Amit Schendel
Senior Security Researcher

Jan 3, 2026·6 min read·0 visits

PoC Available

Executive Summary (TL;DR)

Picklescan, a security scanner for Python pickle files, had a blind spot. It didn't check for dangerous functions in the C-optimized `_operator` module. This allowed attackers to craft malicious pickles that bypassed the scan and achieved Remote Code Execution. Update to version 0.0.34 immediately.

The Picklescan library, a tool designed to detect malicious Python pickle files, contained a critical vulnerability allowing for Remote Code Execution (RCE). The flaw stemmed from an incomplete blacklist that failed to account for dangerous functions within Python's C-optimized `_operator` module. Attackers could craft a pickle payload using `_operator.methodcaller` or `_operator.attrgetter` to bypass Picklescan's checks, leading to arbitrary command execution when the seemingly 'safe' file was deserialized by a victim application.

Official Patches

GitHubFix commit for GHSA-955r-x9j8-7rhh
GitHubPatched release v0.0.34

Fix Analysis (1)

Technical Appendix

CVSS Score
9.3/ 10

Affected Systems

picklescan

Affected Versions Detail

Product
Affected Versions
Fixed Version
picklescan
mmaitre314
< 0.0.340.0.34
AttributeDetail
CWE IDCWE-502
WeaknessDeserialization of Untrusted Data
Attack VectorNetwork / File
CVSSv3.1 Score9.3 (Critical)
ImpactRemote Code Execution
Exploit StatusProof-of-Concept Available
KEV StatusNot Listed

MITRE ATT&CK Mapping

T1204.002Malicious File
Execution
CWE-502
Deserialization of Untrusted Data

The software deserializes untrusted data without sufficiently verifying that the resulting data will be valid, leading to arbitrary code execution.

Known Exploits & Detection

Vulners / NISL Lab, Tsinghua UniversityThe advisory published on Vulners contains the manually crafted pickle bytecode PoC that demonstrates RCE using `_operator.methodcaller`.

Vulnerability Timeline

Fix was committed to the 'picklescan' repository.
2025-12-27
GitHub security advisory GHSA-955r-x9j8-7rhh was published.
2025-12-30

References & Sources

  • [1]GitHub Advisory: Picklescan vulnerable to RCE via missing detection
  • [2]OSV.dev Entry for GHSA-955r-x9j8-7rhh
  • [3]Vulners Database Entry with PoC
  • [4]The Fix Commit on GitHub

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.