Incomplete List of Disallowed Inputs Affecting fickling package, versions [,0.1.8)


Severity

Recommended
0.0
low
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PYTHON-FICKLING-15325668
  • published22 Feb 2026
  • disclosed20 Feb 2026
  • creditAnmol Vats

Introduced: 20 Feb 2026

CVE NOT AVAILABLE CWE-184  (opens in a new tab)

How to fix?

Upgrade fickling to version 0.1.8 or higher.

Overview

fickling is an A static analyzer and interpreter for Python pickle data

Affected versions of this package are vulnerable to Incomplete List of Disallowed Inputs in the check_safety function. An attacker can trigger outbound TCP connections during deserialization by crafting malicious pickle files that exploit stdlib network-protocol constructors. This allows the attacker to receive network callbacks, exfiltrate host information, probe internal services, or establish covert channels bypassing safety checks.

CVSS Base Scores

version 4.0
version 3.1