Duplicate Advisory: Picklescan Bypass is Possible via File Extension Mismatch
Critical severity
GitHub Reviewed
Published
Sep 17, 2025
to the GitHub Advisory Database
•
Updated Sep 17, 2025
Withdrawn
This advisory was withdrawn on Sep 17, 2025
Description
Published by the National Vulnerability Database
Sep 17, 2025
Published to the GitHub Advisory Database
Sep 17, 2025
Reviewed
Sep 17, 2025
Withdrawn
Sep 17, 2025
Last updated
Sep 17, 2025
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-jgw4-cr84-mqxg. This link is maintained to preserve external references.
Original Description
An Improper Input Validation vulnerability in the scanning logic of mmaitre314 picklescan versions up to and including 0.0.30 allows a remote attacker to bypass pickle files security checks by supplying a standard pickle file with a PyTorch-related file extension. When the pickle file incorrectly considered safe is loaded, it can lead to the execution of malicious code.
References