Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-69872

Опубликовано: 11 фев. 2026
Источник: debian
EPSS Низкий

Описание

DiskCache (python-diskcache) through 5.6.3 uses Python pickle for serialization by default. An attacker with write access to the cache directory can achieve arbitrary code execution when a victim application reads from the cache.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
diskcacheunfixedpackage
diskcachepostponedtrixiepackage
diskcachepostponedbookwormpackage
diskcachepostponedbullseyepackage

Примечания

  • https://github.com/EthanKim88/ethan-cve-disclosures/blob/main/CVE-2025-69872-DiskCache-Pickle-Deserialization.md

  • https://github.com/grantjenks/python-diskcache/issues/357

EPSS

Процентиль: 12%
0.00039
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 2 месяцев назад

DiskCache (python-diskcache) through 5.6.3 uses Python pickle for serialization by default. An attacker with write access to the cache directory can achieve arbitrary code execution when a victim application reads from the cache.

CVSS3: 7.6
redhat
около 2 месяцев назад

DiskCache (python-diskcache) through 5.6.3 uses Python pickle for serialization by default. An attacker with write access to the cache directory can achieve arbitrary code execution when a victim application reads from the cache.

CVSS3: 9.8
nvd
около 2 месяцев назад

DiskCache (python-diskcache) through 5.6.3 uses Python pickle for serialization by default. An attacker with write access to the cache directory can achieve arbitrary code execution when a victim application reads from the cache.

github
около 2 месяцев назад

DiskCache has unsafe pickle deserialization

EPSS

Процентиль: 12%
0.00039
Низкий
Уязвимость CVE-2025-69872