Логотип exploitDog
bind:CVE-2025-61622
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-61622

Количество 2

Количество 2

nvd логотип

CVE-2025-61622

4 месяца назад

Deserialization of untrusted data in python in pyfory versions 0.12.0 through 0.12.2, or the legacy pyfury versions from 0.1.0 through 0.10.3: allows arbitrary code execution. An application is vulnerable if it reads pyfory serialized data from untrusted sources. An attacker can craft a data stream that selects pickle-fallback serializer during deserialization, leading to the execution of `pickle.loads`, which is vulnerable to remote code execution. Users are recommended to upgrade to pyfory version 0.12.3 or later, which has removed pickle fallback serializer and thus fixes this issue.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-538v-3wq9-4h3r

4 месяца назад

Apache Pyfory python is vulnerable to deserialization of untrusted data

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-61622

Deserialization of untrusted data in python in pyfory versions 0.12.0 through 0.12.2, or the legacy pyfury versions from 0.1.0 through 0.10.3: allows arbitrary code execution. An application is vulnerable if it reads pyfory serialized data from untrusted sources. An attacker can craft a data stream that selects pickle-fallback serializer during deserialization, leading to the execution of `pickle.loads`, which is vulnerable to remote code execution. Users are recommended to upgrade to pyfory version 0.12.3 or later, which has removed pickle fallback serializer and thus fixes this issue.

CVSS3: 9.8
0%
Низкий
4 месяца назад
github логотип
GHSA-538v-3wq9-4h3r

Apache Pyfory python is vulnerable to deserialization of untrusted data

CVSS3: 9.8
0%
Низкий
4 месяца назад

Уязвимостей на страницу