CVE-2025-67747
Python vulnerability analysis and mitigation

Fickling is a Python pickling decompiler and static analyzer. Versions prior to 0.1.6 are missing marshal and types from the block list of unsafe module imports. Fickling started blocking both modules to address this issue. This allows an attacker to craft a malicious pickle file that can bypass fickling since it misses detections for types.FunctionType and marshal.loads. A user who deserializes such a file, believing it to be safe, would inadvertently execute arbitrary code on their system. This impacts any user or system that uses Fickling to vet pickle files for security issues. The issue was fixed in version 0.1.6.


SourceNVD

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-67748HIGH7.1
  • PythonPython
  • fickling
NoYesDec 16, 2025
CVE-2025-67747HIGH7.1
  • PythonPython
  • fickling
NoYesDec 16, 2025
CVE-2025-68113MEDIUM6.5
  • JavaScriptJavaScript
  • github.com/altcha-org/altcha-lib-go
NoYesDec 16, 2025
CVE-2025-68146MEDIUM6.3
  • PythonPython
  • python-filelock
NoYesDec 16, 2025
CVE-2025-68142LOW2.7
  • PythonPython
  • pymdown-extensions
NoYesDec 16, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management