picklescan before 0.0.23 is vulnerable to a ZIP archive manipulation attack that causes it to crash when attempting to extract and scan PyTorch model archives. By modifying the filename in the ZIP...
Full analysis pending. Showing NVD description excerpt.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| picklescan | pip | — | No patch |
| picklescan | pip | < 0.0.23 | 0.0.23 |
Severity & Risk
Recommended Action
Patch available
Update picklescan to version 0.0.23
Compliance Impact
Compliance analysis pending. Sign in for full compliance mapping when available.
Technical Details
NVD Description
picklescan before 0.0.23 is vulnerable to a ZIP archive manipulation attack that causes it to crash when attempting to extract and scan PyTorch model archives. By modifying the filename in the ZIP header while keeping the original filename in the directory listing, an attacker can make PickleScan raise a BadZipFile error. However, PyTorch's more forgiving ZIP implementation still allows the model to be loaded, enabling malicious payloads to bypass detection.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L References
- github.com/mmaitre314/picklescan/commit/e58e45e0d9e091159c1554f9b04828bbb40b9781 Patch
- github.com/mmaitre314/picklescan/security/advisories/GHSA-7q5r-7gvp-wc82 Exploit Vendor
- sonatype.com/security-advisories/cve-2025-1944
- github.com/advisories/GHSA-7q5r-7gvp-wc82
- github.com/mmaitre314/picklescan/commit/e58e45e0d9e091159c1554f9b04828bbb40b9781
- github.com/mmaitre314/picklescan/security/advisories/GHSA-7q5r-7gvp-wc82
- github.com/pypa/advisory-database/tree/main/vulns/picklescan/PYSEC-2025-20.yaml
- nvd.nist.gov/vuln/detail/CVE-2025-1944
- sites.google.com/sonatype.com/vulnerabilities/cve-2025-1944