Home » Database

AVID-2026-R1712

Description

erdogant pypickle pypickle.py load deserialization (CVE-2025-5174)

Details

A vulnerability was found in erdogant pypickle up to 1.1.5 and classified as problematic. Affected by this issue is the function load of the file pypickle/pypickle.py. The manipulation leads to deserialization. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. Upgrading to version 2.0.0 is able to address this issue. The patch is identified as 14b4cae704a0bb4eb6723e238f25382d847a1917. It is recommended to upgrade the affected component.

Reason for inclusion in AVID: CVE-2025-5174 describes a load() deserialization vulnerability in erdogant pypickle (versions up to 1.1.5). It is a software security vulnerability (CWE-502) with evidence of exploitation potential and a patch in 2.0.0. This package is a Python library that can be used in AI/ML pipelines for serialization/deserialization tasks, making it relevant to the supply chain of general-purpose AI systems. The issue affects software components that could be deployed, trained, or run within AI stacks, and the CVE provides concrete remediation guidance. Therefore it qualifies as a software supply-chain vulnerability in AI systems.

References

Affected or Relevant Artifacts

  • Developer: erdogant
  • Deployer: erdogant
  • Artifact Details:
TypeName
Systempypickle

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.1
Vector StringCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Base Score5.3
Base Severity🟠 Medium

CWE

IDDescription
CWE-502Deserialization
CWE-20Improper Input Validation

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2025-05-26
  • Version: 0.3.3
  • AVID Entry