Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Vulnerability in Python PLY Library Enables Remote Code Execution

Critical Vulnerability in Python PLY Library Enables Remote Code Execution

Posted on January 27, 2026January 27, 2026 By CWS

A crucial vulnerability has been recognized within the PyPI-distributed model of PLY (Python Lex-Yacc) 3.11, permitting arbitrary code execution by way of unsafe deserialization of untrusted pickle recordsdata.

The vulnerability, assigned CVE-2025-56005, impacts the undocumented picklefile parameter within the yacc() perform, which stays absent from official documentation regardless of being current within the manufacturing launch.

The vulnerability stems from the yacc(picklefile=…) parameter invoking pickle.load() on attacker-controlled recordsdata with out validation.

Python’s pickle module inherently helps arbitrary code execution throughout deserialization by way of the __reduce__() technique, enabling malicious payloads to execute system instructions earlier than parser initialization happens.

This presents a singular danger profile as a result of the code execution occurs silently throughout software startup, earlier than any parsing logic is reached.

The vulnerability is especially harmful in environments the place parser tables are cached on disk, shared between companies, or generated in CI/CD pipelines.

Exploitation turns into potential when attackers can management, change, or affect the pickle file path, equivalent to:

Space / ComponentDescriptionCached parser desk locationsLocations the place parser tables are saved locallyShared community directoriesNetwork-accessible shared foldersCI/CD pipeline artifactsBuild and deployment output filesConfigurable or writable file pathsApplication-defined writable paths

The vulnerability may be demonstrated by way of a malicious pickle payload that executes system instructions throughout deserialization.

When yacc(picklefile=’exploit.pkl’) masses a crafted pickle file containing serialized objects with embedded __reduce__() strategies, arbitrary code execution is assured earlier than the parser turns into operational.

In line with the advisory, organizations ought to instantly implement the next mitigations:

Keep away from utilizing the picklefile parameter with untrusted or externally writable recordsdata. Disable loading parser tables from user-controlled places.

Deal with all pickle recordsdata as doubtlessly unsafe enter. Regenerate parser tables dynamically somewhat than loading from disk.

Builders ought to replace functions that use PLY 3.11 and audit configurations for potential publicity by way of the undocumented parameter.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Code, Critical, Enables, Execution, Library, PLY, Python, Remote, Vulnerability

Post navigation

Previous Post: APT Hackers Attacking Indian Government Using GOGITTER tool and GITSHELLPAD Malware
Next Post: China-Linked Hackers Have Used the PeckBirdy JavaScript C2 Framework Since 2023

Related Posts

Shuyal Stealer Attacking 19 Browsers to Steal Login Credentials Shuyal Stealer Attacking 19 Browsers to Steal Login Credentials Cyber Security News
Google Releases Guide to Harden Security Strategy and Detection Capabilities Against UNC6040 Google Releases Guide to Harden Security Strategy and Detection Capabilities Against UNC6040 Cyber Security News
Hackers Actively Exploiting 7-Zip RCE Vulnerability in the Wild Hackers Actively Exploiting 7-Zip RCE Vulnerability in the Wild Cyber Security News
New PoisonSeed Attack Let Attackers Trick Users into Scanning a QR Code with an MFA Authenticator New PoisonSeed Attack Let Attackers Trick Users into Scanning a QR Code with an MFA Authenticator Cyber Security News
Ransomware Gangs Leverage Remote Access Tools to Gain Persistence and Evade Defenses Ransomware Gangs Leverage Remote Access Tools to Gain Persistence and Evade Defenses Cyber Security News
New Malware Targeting WooCommerce Sites with Malicious Plugins Steals Credit Card Data New Malware Targeting WooCommerce Sites with Malicious Plugins Steals Credit Card Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News