A maliciously crafted QPY file can potential execute arbitrary-code embedded in the payload without privilege escalation when deserialising QPY formats < 13. A python process calling Qiskit 0.18.0 through 1.4.1's `qiskit.qpy.load()` function could potentially execute any arbitrary Python code embedded in the correct place in the binary file as part of specially constructed payload.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.ibm.com/support/pages/node/7185949 |
![]() ![]() |
History
Fri, 14 Mar 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 14 Mar 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A maliciously crafted QPY file can potential execute arbitrary-code embedded in the payload without privilege escalation when deserialising QPY formats < 13. A python process calling Qiskit 0.18.0 through 1.4.1's `qiskit.qpy.load()` function could potentially execute any arbitrary Python code embedded in the correct place in the binary file as part of specially constructed payload. | |
Title | Qiskit SDK code execution | |
Weaknesses | CWE-502 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: ibm
Published:
Updated: 2025-03-15T03:55:25.922Z
Reserved: 2025-03-05T16:10:36.949Z
Link: CVE-2025-2000

Updated: 2025-03-14T13:28:16.074Z

Status : Received
Published: 2025-03-14T13:15:40.907
Modified: 2025-03-14T13:15:40.907
Link: CVE-2025-2000

No data.