CVE-2025-10156
Python vulnerability analysis and mitigation

Overview

CVE-2025-10156 is a security vulnerability discovered in the ZIP archive scanning component of mmaitre314 picklescan. The vulnerability was disclosed on September 8, 2025, and affects versions 0.0.30 and earlier of the picklescan package. The issue allows remote attackers to bypass security scans through crafted ZIP archives containing files with bad Cyclic Redundancy Check (CRC) values (GitHub Advisory).

Technical details

The vulnerability stems from an improper handling of exceptional conditions (CWE-693) in picklescan's ZIP archive processing. When encountering a file with a mismatched CRC within a ZIP archive, picklescan fails with an error instead of continuing to scan other potentially valid files. The vulnerability has been assigned a CVSS v4.0 base score of 9.3 CRITICAL with the vector string CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N (NVD).

Impact

The vulnerability allows attackers to hide malicious pickle payloads within ZIP archives that PyTorch might still be able to load, as PyTorch often disables CRC checks. This creates a significant security blind spot where malicious code can be distributed and potentially executed without detection by picklescan. A real-world example of this vulnerability has been demonstrated with the HuggingFace model repository (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in version 0.0.31 of picklescan. The fix involves implementing a relaxed ZIP file handling mechanism that continues scanning even when encountering CRC errors. Organizations are strongly advised to upgrade to this version. For those unable to upgrade immediately, there is no effective workaround other than implementing additional security controls at other layers (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-6237CRITICAL9.8
  • PythonPython
  • invokeai
NoNoSep 18, 2025
CVE-2025-10157CRITICAL9.3
  • PythonPython
  • picklescan
NoYesSep 17, 2025
CVE-2025-10156CRITICAL9.3
  • PythonPython
  • picklescan
NoYesSep 17, 2025
CVE-2025-9906HIGH8.6
  • PythonPython
  • keras
NoYesSep 19, 2025
CVE-2025-9905HIGH7.3
  • PythonPython
  • keras
NoYesSep 19, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management