We found results for “”
CVE-2025-67747
Good to know:
Date: December 15, 2025
Fickling is a Python pickling decompiler and static analyzer. Versions prior to 0.1.6 are missing "marshal" and "types" from the block list of unsafe module imports. Fickling started blocking both modules to address this issue. This allows an attacker to craft a malicious pickle file that can bypass fickling since it misses detections for "types.FunctionType" and "marshal.loads". A user who deserializes such a file, believing it to be safe, would inadvertently execute arbitrary code on their system. This impacts any user or system that uses Fickling to vet pickle files for security issues. The issue was fixed in version 0.1.6.
Severity Score
Related Resources (7)
Severity Score
Weakness Type (CWE)
Top Fix
Upgrade Version
Upgrade to version fickling - 0.1.6;https://github.com/trailofbits/fickling.git - v0.1.6
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | LOCAL |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | REQUIRED |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | HIGH |
| Availability (A): | HIGH |
Vulnerabilities
Projects
Contact Us


