Логотип exploitDog
bind:CVE-2025-61765
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-61765

Количество 5

Количество 5

ubuntu логотип

CVE-2025-61765

4 месяца назад

python-socketio is a Python implementation of the Socket.IO realtime client and server. A remote code execution vulnerability in python-socketio versions prior to 5.14.0 allows attackers to execute arbitrary Python code through malicious pickle deserialization in multi-server deployments on which the attacker previously gained access to the message queue that the servers use for internal communications. When Socket.IO servers are configured to use a message queue backend such as Redis for inter-server communication, messages sent between the servers are encoded using the `pickle` Python module. When a server receives one of these messages through the message queue, it assumes it is trusted and immediately deserializes it. The vulnerability stems from deserialization of messages using Python's `pickle.loads()` function. Having previously obtained access to the message queue, the attacker can send a python-socketio server a crafted pickle payload that executes arbitrary code during de...

CVSS3: 6.4
EPSS: Низкий
nvd логотип

CVE-2025-61765

4 месяца назад

python-socketio is a Python implementation of the Socket.IO realtime client and server. A remote code execution vulnerability in python-socketio versions prior to 5.14.0 allows attackers to execute arbitrary Python code through malicious pickle deserialization in multi-server deployments on which the attacker previously gained access to the message queue that the servers use for internal communications. When Socket.IO servers are configured to use a message queue backend such as Redis for inter-server communication, messages sent between the servers are encoded using the `pickle` Python module. When a server receives one of these messages through the message queue, it assumes it is trusted and immediately deserializes it. The vulnerability stems from deserialization of messages using Python's `pickle.loads()` function. Having previously obtained access to the message queue, the attacker can send a python-socketio server a crafted pickle payload that executes arbitrary code during deser

CVSS3: 6.4
EPSS: Низкий
debian логотип

CVE-2025-61765

4 месяца назад

python-socketio is a Python implementation of the Socket.IO realtime c ...

CVSS3: 6.4
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:3780-1

4 месяца назад

Security update for python-python-socketio

EPSS: Низкий
github логотип

GHSA-g8c6-8fjj-2r4m

4 месяца назад

python-socketio vulnerable to arbitrary Python code execution (RCE) through malicious pickle deserialization in certain multi-server deployments

CVSS3: 6.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-61765

python-socketio is a Python implementation of the Socket.IO realtime client and server. A remote code execution vulnerability in python-socketio versions prior to 5.14.0 allows attackers to execute arbitrary Python code through malicious pickle deserialization in multi-server deployments on which the attacker previously gained access to the message queue that the servers use for internal communications. When Socket.IO servers are configured to use a message queue backend such as Redis for inter-server communication, messages sent between the servers are encoded using the `pickle` Python module. When a server receives one of these messages through the message queue, it assumes it is trusted and immediately deserializes it. The vulnerability stems from deserialization of messages using Python's `pickle.loads()` function. Having previously obtained access to the message queue, the attacker can send a python-socketio server a crafted pickle payload that executes arbitrary code during de...

CVSS3: 6.4
2%
Низкий
4 месяца назад
nvd логотип
CVE-2025-61765

python-socketio is a Python implementation of the Socket.IO realtime client and server. A remote code execution vulnerability in python-socketio versions prior to 5.14.0 allows attackers to execute arbitrary Python code through malicious pickle deserialization in multi-server deployments on which the attacker previously gained access to the message queue that the servers use for internal communications. When Socket.IO servers are configured to use a message queue backend such as Redis for inter-server communication, messages sent between the servers are encoded using the `pickle` Python module. When a server receives one of these messages through the message queue, it assumes it is trusted and immediately deserializes it. The vulnerability stems from deserialization of messages using Python's `pickle.loads()` function. Having previously obtained access to the message queue, the attacker can send a python-socketio server a crafted pickle payload that executes arbitrary code during deser

CVSS3: 6.4
2%
Низкий
4 месяца назад
debian логотип
CVE-2025-61765

python-socketio is a Python implementation of the Socket.IO realtime c ...

CVSS3: 6.4
2%
Низкий
4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:3780-1

Security update for python-python-socketio

2%
Низкий
4 месяца назад
github логотип
GHSA-g8c6-8fjj-2r4m

python-socketio vulnerable to arbitrary Python code execution (RCE) through malicious pickle deserialization in certain multi-server deployments

CVSS3: 6.4
2%
Низкий
4 месяца назад

Уязвимостей на страницу