
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A critical vulnerability (CVE-2025-5175) was discovered in erdogant pypickle versions up to 1.1.5, affecting the save() function in pypickle/pypickle.py. The vulnerability was discovered and disclosed on May 25, 2025, and leads to improper authorization issues. The vulnerability has been classified with CWE-285 (Improper Authorization) and CWE-266 (Incorrect Privilege Assignment) (NVD, Wiz).
The vulnerability stems from insufficient validation in the save() function within pypickle.py, which allows unintended file overwrites through path traversal. The issue has received a CVSS v3.1 base score of 5.3 (MEDIUM) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L. The vulnerability requires local access to exploit and allows manipulation of file paths to overwrite sensitive files (GitHub Issue).
The vulnerability can lead to unauthorized file overwrites, potentially causing data loss or corruption. An attacker with local access could manipulate file paths to overwrite sensitive files, including system configurations or user files, which could result in security vulnerabilities or system instability. The impact is particularly severe when the overwrite parameter is set to True, as it allows overwriting critical files in unauthorized locations on the filesystem (GitHub Issue).
The vulnerability has been patched in version 2.0.0 of pypickle. The fix includes implementation of path validation, restrictions on save locations, and additional security mechanisms for loading and saving pickle files. The patch (14b4cae704a0bb4eb6723e238f25382d847a1917) implements several security improvements including path traversal detection, validation of file extensions, and restrictions on save locations. Users are strongly recommended to upgrade to version 2.0.0 or later (GitHub Release).
The developer community responded promptly to the disclosure, with the project maintainers releasing a comprehensive security update in version 2.0.0. The update includes extensive security improvements for both saving and loading operations, with new validation mechanisms and restrictions on file operations. The changes have been well-received by the community, though it's noted that the updates may require pipeline modifications due to the new security restrictions (GitHub Release).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”