Permissive List of Allowed Inputs Affecting picklescan package, versions [,1.0.4)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PYTHON-PICKLESCAN-15435873
  • published6 Mar 2026
  • disclosed3 Mar 2026
  • creditYash Rajesh Chhabria

Introduced: 3 Mar 2026

CVE NOT AVAILABLE CWE-183  (opens in a new tab)

How to fix?

Upgrade picklescan to version 1.0.4 or higher.

Overview

picklescan is a Security scanner detecting Python Pickle files performing suspicious actions

Affected versions of this package are vulnerable to Permissive List of Allowed Inputs in the _unsafe_globals() function that does not block pkgutil.resolve_name() Python stdlib function. An attacker can execute arbitrary code by crafting a pickle payload that uses pkgutil.resolve_name() to access and invoke blocked or dangerous functions, bypassing the intended blocklist protections.

References

CVSS Base Scores

version 4.0
version 3.1