CVE-2025-1944 – PickleScan PyTorch ZIP Archive Corruption Vulnerability

The following table lists the changes that have been made to the
CVE-2025-1944 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by 103e4ec9-0a87-450b-af77-479448ddef11

    Mar. 10, 2025

    Action Type Old Value New Value
    Added Description picklescan before 0.0.23 is vulnerable to a ZIP archive manipulation attack that causes it to crash when attempting to extract and scan PyTorch model archives. By modifying the filename in the ZIP header while keeping the original filename in the directory listing, an attacker can make PickleScan raise a BadZipFile error. However, PyTorch’s more forgiving ZIP implementation still allows the model to be loaded, enabling malicious payloads to bypass detection.
    Added CVSS V4.0 AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
    Added CWE CWE-345
    Added Reference https://github.com/mmaitre314/picklescan/commit/e58e45e0d9e091159c1554f9b04828bbb40b9781
    Added Reference https://github.com/mmaitre314/picklescan/security/advisories/GHSA-7q5r-7gvp-wc82
    Added Reference https://sites.google.com/sonatype.com/vulnerabilities/cve-2025-1944
Share the Post:

Related Posts