picklescan before 0.0.23 fails to detect malicious pickle files inside PyTorch model archives when certain ZIP file flag bits are modified. By flipping specific bits in the ZIP file headers, an attacker can embed malicious pickle files that remain undetected by PickleScan while still being successfully loaded by PyTorch's torch.load(). This can lead to arbitrary code execution when loading a compromised model.
Metrics
Affected Vendors & Products
References
History
Wed, 19 Mar 2025 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Mmaitre314
Mmaitre314 picklescan |
|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:a:mmaitre314:picklescan:*:*:*:*:*:*:*:* | |
Vendors & Products |
Mmaitre314
Mmaitre314 picklescan |
|
Metrics |
cvssV3_1
|
Mon, 10 Mar 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 10 Mar 2025 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | picklescan before 0.0.23 fails to detect malicious pickle files inside PyTorch model archives when certain ZIP file flag bits are modified. By flipping specific bits in the ZIP file headers, an attacker can embed malicious pickle files that remain undetected by PickleScan while still being successfully loaded by PyTorch's torch.load(). This can lead to arbitrary code execution when loading a compromised model. | |
Title | picklescan - Zip Flag Bit Exploit Crashes Picklescan But Not PyTorch | |
Weaknesses | CWE-345 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: Sonatype
Published:
Updated: 2025-03-10T12:05:04.004Z
Reserved: 2025-03-04T12:59:35.306Z
Link: CVE-2025-1945

Updated: 2025-03-10T12:04:55.756Z

Status : Analyzed
Published: 2025-03-10T12:15:12.450
Modified: 2025-03-19T16:14:37.237
Link: CVE-2025-1945

No data.