CVE-2025-10155
Python vulnerability analysis and mitigation

Overview

An Improper Input Validation vulnerability (CVE-2025-10155) was discovered in the scanning logic of mmaitre314 picklescan versions up to and including 0.0.30. The vulnerability was disclosed on September 17, 2025. The vulnerability affects the picklescan package, a security tool designed to scan pickle files for potential threats (NVD).

Technical details

The vulnerability stems from improper input validation in the scan_bytes function within picklescan/scanner.py. When a standard pickle file is given a PyTorch-related file extension (e.g., .bin), the scanner prioritizes PyTorch file extension checks and errors out instead of falling back to standard pickle analysis. The vulnerability has been assigned a CVSS v4.0 Base Score of 9.3 (Critical) with the vector string CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N. The vulnerability is classified as CWE-20 (Improper Input Validation) (NVD, GitHub Advisory).

Impact

The vulnerability allows attackers to bypass security checks by disguising malicious pickle payloads within files using common PyTorch extensions. This significantly weakens the security provided by PickleScan and opens the door to various supply chain attacks. Organizations and individuals relying on PickleScan to ensure the safety of PyTorch models or other files containing embedded pickle objects are affected. When exploited, malicious code can execute when the file is loaded by a vulnerable application or user (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in version 0.0.31. The fix modifies the scanning logic to ensure that standard pickle scanning is attempted as a fallback mechanism when PyTorch scanning fails or is not applicable. The patch includes changes to the scan_bytes function to continue with other scan methods instead of returning an error when PyTorch scanning fails (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-65896CRITICAL9.8
  • PythonPython
  • asyncmy
NoNoDec 02, 2025
CVE-2025-66423HIGH7.1
  • PythonPython
  • tryton-server
NoYesNov 30, 2025
CVE-2025-66454MEDIUM6.5
  • PythonPython
  • arcade-mcp-server
NoYesDec 02, 2025
CVE-2025-66424MEDIUM6.5
  • PythonPython
  • trytond
NoYesNov 30, 2025
CVE-2025-65858LOW3.5
  • PythonPython
  • calibreweb
NoNoDec 02, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management