Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
PickleScan 0-Day Vulnerabilities Enable Arbitrary Code Execution via Malicious PyTorch Models

PickleScan 0-Day Vulnerabilities Enable Arbitrary Code Execution via Malicious PyTorch Models

Posted on December 4, 2025December 4, 2025 By CWS

A number of vital zero‑day vulnerabilities in PickleScan, a well-liked open‑supply device used to scan machine studying fashions for malicious code.

PickleScan is broadly used within the AI world, together with by Hugging Face, to verify PyTorch fashions saved with Python’s pickle format.

Pickle is versatile however harmful, as a result of loading a pickle file can run arbitrary Python code. Meaning a mannequin file can secretly embrace instructions to steal knowledge, set up backdoors, or take over a system.

Malicious PyTorch Fashions Set off Code Execution

JFrog’s workforce discovered that attackers might use these flaws to bypass PickleScan’s checks and nonetheless run malicious code when the mannequin is loaded in PyTorch.

Official documentation of Python’s pickle module with a person warning

The primary bug, CVE‑2025‑10155, lets attackers dodge scanning by merely altering the file extension.

A malicious pickle file renamed to a PyTorch‑type extension like .bin or .pt can confuse PickleScan, inflicting it to fail to research the content material. On the similar time, PyTorch nonetheless masses and runs it.

CVE IDVulnerability NameCVSS ScoreSeverityCVE-2025-10155File Extension Bypass9.3CriticalCVE-2025-10156CRC Bypass in ZIP Archives9.3CriticalCVE-2025-10157Unsafe Globals Bypass9.3Critical

The second bug, CVE‑2025‑10156, abuses how ZIP archives are dealt with by corrupting the CRC (integrity verify) values inside a ZIP file.

Attackers may cause PickleScan to crash or fail, however PyTorch should load the mannequin from that very same damaged archive. This creates a blind spot the place malware can cover.

Proof of Idea – how the file extension permits bypassing detection

The third bug, CVE‑2025‑10157, targets PickleScan’s blocklist of “unsafe” modules through the use of subclasses or inside imports of harmful modules like asyncio.

Attackers can slip previous the “Harmful” label and solely be marked as “Suspicious,” though arbitrary instructions can nonetheless be executed.

As a result of many platforms and corporations depend on PickleScan as a fundamental protection layer, these flaws create a critical provide chain danger for AI fashions.

The catalog offers exact details about the mannequin and the proof discovered inside

JFrog’s workforce reported the issues to the PickleScan maintainer on June 29, 2025, and glued them in model 0.0.31, launched on September 2, 2025.

Customers are urged to improve instantly and, when potential, keep away from unsafe pickle‑based mostly fashions. Use layered defenses similar to sandboxes, safer codecs like Safetensors, and safe mannequin repositories.

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:0Day, Arbitrary, Code, Enable, Execution, Malicious, Models, Picklescan, PyTorch, Vulnerabilities

Post navigation

Previous Post: Freedom Mobile Data Breach Exposes Personal Information of Customers
Next Post: New Phishing Attack Mimic as Income Tax Department of India Delivers AsyncRAT

Related Posts

Building a Cyber-Resilient Organization in 2025 Building a Cyber-Resilient Organization in 2025 Cyber Security News
Android Banking Malware deVixor Actively Targeting Users with Ransomware Capabilities Android Banking Malware deVixor Actively Targeting Users with Ransomware Capabilities Cyber Security News
WebRAT Malware via GitHub Repositories Claim as Proof-of-concept Exploits to Attack Users WebRAT Malware via GitHub Repositories Claim as Proof-of-concept Exploits to Attack Users Cyber Security News
0-Click Zendesk Account Takeover Vulnerability Enables Access to all Zendesk Tickets 0-Click Zendesk Account Takeover Vulnerability Enables Access to all Zendesk Tickets Cyber Security News
10 Best Anti-Phishing Tools in 2025 10 Best Anti-Phishing Tools in 2025 Cyber Security News
Hackers Attacking MongoDB Instances to Delete Database and Add Ransom Note Hackers Attacking MongoDB Instances to Delete Database and Add Ransom Note Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files
  • Browser Extensions Pose AI Data Theft Risk
  • Citrix NetScaler Vulnerability Exploited Within Days
  • India to Prohibit Chinese CCTV Sales by 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files
  • Browser Extensions Pose AI Data Theft Risk
  • Citrix NetScaler Vulnerability Exploited Within Days
  • India to Prohibit Chinese CCTV Sales by 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark