Home » Database

AVID-2026-R1638

Description

Remote Code Execution in kedro-org/kedro (CVE-2024-9701)

Details

A Remote Code Execution (RCE) vulnerability has been identified in the Kedro ShelveStore class (version 0.19.8). This vulnerability allows an attacker to execute arbitrary Python code via deserialization of malicious payloads, potentially leading to a full system compromise. The ShelveStore class uses Python’s shelve module to manage session data, which relies on pickle for serialization. Crafting a malicious payload and storing it in the shelve file can lead to RCE when the payload is deserialized.

Reason for inclusion in AVID: CVE-2024-9701 describes a remote code execution vulnerability in Kedro (a data science/ML pipeline framework) via deserialization of malicious payloads in ShelveStore. This is a software vulnerability in a component commonly used to build/train/deploy AI pipelines, representing a software supply-chain risk for general-purpose AI systems. The report provides explicit vulnerability details and references, satisfying evidence requirements.

References

Affected or Relevant Artifacts

  • Developer: kedro-org
  • Deployer: kedro-org
  • Artifact Details:
TypeName
Systemkedro-org/kedro

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.0
Vector StringCVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score9.8
Base Severity🔴 Critical
Attack VectorNETWORK
Attack Complexity🟢 Low
Privileges RequiredNONE
User InteractionNONE
ScopeUNCHANGED
Confidentiality Impact🔴 High
Integrity Impact🔴 High
Availability Impact🔴 High

CWE

IDDescription
CWE-502CWE-502 Deserialization of Untrusted Data

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2025-03-20
  • Version: 0.3.3
  • AVID Entry