jsonpickle@3.2.2 vulnerabilities

jsonpickle encodes/decodes any Python object to/from JSON

Direct Vulnerabilities

Known vulnerabilities in the jsonpickle package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • C
Arbitrary Code Execution

jsonpickle is a Python library for serializing any arbitrary object graph into JSON.

Affected versions of this package are vulnerable to Arbitrary Code Execution during the deserialization process of untrusted user input. The vulnerability derives from the unsafe usage of eval() in the loadrepr().

How to fix Arbitrary Code Execution?

Upgrade jsonpickle to version 3.3.0 or higher.

[,3.3.0)