Headline
GHSA-j424-mc44-f4hj: Duplicate Advisory: Picklescan Bypass is Possible via File Extension Mismatch
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-jgw4-cr84-mqxg. This link is maintained to preserve external references.
Original Description
An Improper Input Validation vulnerability in the scanning logic of mmaitre314 picklescan versions up to and including 0.0.30 allows a remote attacker to bypass pickle files security checks by supplying a standard pickle file with a PyTorch-related file extension. When the pickle file incorrectly considered safe is loaded, it can lead to the execution of malicious code.
- GitHub Advisory Database
- GitHub Reviewed
- GHSA-j424-mc44-f4hj
Duplicate Advisory: Picklescan Bypass is Possible via File Extension Mismatch
Critical severity GitHub Reviewed Published Sep 17, 2025 to the GitHub Advisory Database • Updated Sep 17, 2025
Withdrawn This advisory was withdrawn on Sep 17, 2025
Package
pip picklescan (pip)
Affected versions
< 0.0.31
Published by the National Vulnerability Database
Sep 17, 2025
Published to the GitHub Advisory Database
Sep 17, 2025
Last updated
Sep 17, 2025