Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2025-56005

Опубликовано: 20 янв. 2026
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 9.8

Описание

An undocumented and unsafe feature in the PLY (Python Lex-Yacc) library 3.11 allows Remote Code Execution (RCE) via the picklefile parameter in the yacc() function. This parameter accepts a .pkl file that is deserialized with pickle.load() without validation. Because pickle allows execution of embedded code via __reduce__(), an attacker can achieve code execution by passing a malicious pickle file. The parameter is not mentioned in official documentation or the GitHub repository, yet it is active in the PyPI version. This introduces a stealthy backdoor and persistence risk.

РелизСтатусПримечание
devel

deferred

2026-01-22
esm-infra/bionic

deferred

2026-01-22
esm-infra/focal

deferred

2026-01-22
esm-infra/xenial

deferred

2026-01-22
jammy

deferred

2026-01-22
noble

deferred

2026-01-22
questing

deferred

2026-01-22
upstream

needs-triage

Показывать по

EPSS

Процентиль: 77%
0.01017
Низкий

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
18 дней назад

An undocumented and unsafe feature in the PLY (Python Lex-Yacc) library 3.11 allows Remote Code Execution (RCE) via the `picklefile` parameter in the `yacc()` function. This parameter accepts a `.pkl` file that is deserialized with `pickle.load()` without validation. Because `pickle` allows execution of embedded code via `__reduce__()`, an attacker can achieve code execution by passing a malicious pickle file. The parameter is not mentioned in official documentation or the GitHub repository, yet it is active in the PyPI version. This introduces a stealthy backdoor and persistence risk.

CVSS3: 9.8
debian
18 дней назад

An undocumented and unsafe feature in the PLY (Python Lex-Yacc) librar ...

CVSS3: 9.8
github
18 дней назад

An undocumented and unsafe feature in the PLY (Python Lex-Yacc) library 3.11 allows Remote Code Execution (RCE) via the `picklefile` parameter in the `yacc()` function. This parameter accepts a `.pkl` file that is deserialized with `pickle.load()` without validation. Because `pickle` allows execution of embedded code via `__reduce__()`, an attacker can achieve code execution by passing a malicious pickle file. The parameter is not mentioned in official documentation or the GitHub repository, yet it is active in the PyPI version. This introduces a stealthy backdoor and persistence risk.

EPSS

Процентиль: 77%
0.01017
Низкий

9.8 Critical

CVSS3