The following table lists the changes that have been made to the
CVE-2025-1944 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.
-
New CVE Received
by 103e4ec9-0a87-450b-af77-479448ddef11Mar. 10, 2025
Action Type Old Value New Value Added Description picklescan before 0.0.23 is vulnerable to a ZIP archive manipulation attack that causes it to crash when attempting to extract and scan PyTorch model archives. By modifying the filename in the ZIP header while keeping the original filename in the directory listing, an attacker can make PickleScan raise a BadZipFile error. However, PyTorch’s more forgiving ZIP implementation still allows the model to be loaded, enabling malicious payloads to bypass detection. Added CVSS V4.0 AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Added CWE CWE-345 Added Reference https://github.com/mmaitre314/picklescan/commit/e58e45e0d9e091159c1554f9b04828bbb40b9781 Added Reference https://github.com/mmaitre314/picklescan/security/advisories/GHSA-7q5r-7gvp-wc82 Added Reference https://sites.google.com/sonatype.com/vulnerabilities/cve-2025-1944