Deserialization of Untrusted Data The advisory has been revoked - it doesn't affect any version of package parso Open this link in a new tab

    Threat Intelligence

    Exploit Maturity Proof of concept
    EPSS 0.13% (48th percentile)
Expand this section
7.5 high

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-PYTHON-PARSO-174930
  • published 6 Jun 2019
  • disclosed 6 Jun 2019
  • credit Alexandre D'Hondt


This was deemed not a vulnerability.


parso is a Python parser that supports error recovery and round-trip parsing for different Python versions.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. A deserialization vulnerability exists in the way parso handles grammar parsing from the cache. Cache loading relies on pickle and, provided that an evil pickle can be written to a cache grammar file and that its parsing can be triggered, this flaw leads to Arbitrary Code Execution.