icon

We found results for “

CVE-2026-25632

Good to know:

icon
icon

Date: February 6, 2026

Impact EPyT-Flow’s REST API parses attacker-controlled JSON request bodies using a custom deserializer (my_load_from_json) that supports a type field. When type is present, the deserializer dynamically imports an attacker-specified module/class and instantiates it with attacker-supplied arguments. This allows invoking dangerous classes such as subprocess.Popen, which can lead to OS command execution during JSON parsing. This also affects the loading of JSON files. Patches EPyT-Flow has been patched in 0.16.1 -- affects all versions <= 0.16.0 Workarounds Do not load any JSON from untrusted sources and do not expose the REST API. Credits EPyT-Flow thanks Jarrett Chan (@syphonetic) for detecting and reporting the bug.

Severity Score

Severity Score

Weakness Type (CWE)

Deserialization of Untrusted Data

CWE-502

Top Fix

icon

Upgrade Version

Upgrade to version epyt-flow - 0.16.1;https://github.com/WaterFutures/EPyT-Flow.git - v0.16.1

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): CHANGED
Confidentiality (C): HIGH
Integrity (I): HIGH
Availability (A): HIGH

Do you need more information?

Contact Us