Home

Description

Fickling is a Python pickling decompiler and static analyzer. Prior to version 0.1.7, the unsafe_imports() method in Fickling's static analyzer fails to flag several high-risk Python modules that can be used for arbitrary code execution. Malicious pickles importing these modules will not be detected as unsafe, allowing attackers to bypass Fickling's primary static safety checks. This issue has been patched in version 0.1.7.

PUBLISHED Reserved 2026-01-07 | Published 2026-01-10 | Updated 2026-01-14 | Assigner GitHub_M




HIGH: 8.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P

Problem types

CWE-184: Incomplete List of Disallowed Inputs

CWE-502: Deserialization of Untrusted Data

Product status

< 0.1.7
affected

References

github.com/...ckling/security/advisories/GHSA-q5qq-mvfm-j35x exploit

github.com/...ckling/security/advisories/GHSA-q5qq-mvfm-j35x

github.com/...ommit/29d5545e74b07766892c1f0461b801afccee4f91

github.com/...ommit/9a2b3f89bd0598b528d62c10a64c1986fcb09f66

github.com/...ommit/b793563e60a5e039c5837b09d7f4f6b92e6040d1

github.com/...ommit/eb299b453342f1931c787bcb3bc33f3a03a173f9

github.com/trailofbits/fickling/releases/tag/v0.1.7

cve.org (CVE-2026-22609)

nvd.nist.gov (CVE-2026-22609)

Download JSON