Improperly Implemented Security Check for Standard Affecting fickling package, versions [,0.1.9)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PYTHON-FICKLING-15435875
  • published6 Mar 2026
  • disclosed4 Mar 2026
  • creditmldangelo

Introduced: 4 Mar 2026

New CVE NOT AVAILABLE CWE-358  (opens in a new tab)

How to fix?

Upgrade fickling to version 0.1.9 or higher.

Overview

fickling is an A static analyzer and interpreter for Python pickle data

Affected versions of this package are vulnerable to Improperly Implemented Security Check for Standard in the always_check_safety() function. An attacker can execute arbitrary code by supplying a malicious pickle payload to unprotected deserialization entry points.

CVSS Base Scores

version 4.0
version 3.1