By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Picklescan Bugs Allow Malicious PyTorch Models to Evade Scans and Execute Code
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Picklescan Bugs Allow Malicious PyTorch Models to Evade Scans and Execute Code
Computing

Picklescan Bugs Allow Malicious PyTorch Models to Evade Scans and Execute Code

News Room
Last updated: 2025/12/03 at 4:38 AM
News Room Published 3 December 2025
Share
Picklescan Bugs Allow Malicious PyTorch Models to Evade Scans and Execute Code
SHARE

Dec 03, 2025Ravie LakshmananMachine Learning / Vulnerability

Three critical security flaws have been disclosed in an open-source utility called Picklescan that could allow malicious actors to execute arbitrary code by loading untrusted PyTorch models, effectively bypassing the tool’s protections.

Picklescan, developed and maintained by Matthieu Maitre (@mmaitre314), is a security scanner that’s designed to parse Python pickle files and detect suspicious imports or function calls, before they are executed. Pickle is a widely used serialization format in machine learning, including PyTorch, which uses the format to save and load models.

But pickle files can also be a huge security risk, as they can be used to automatically trigger the execution of arbitrary Python code when they are loaded. This necessitates that users and organizations load trusted models, or load model weights from TensorFlow and Flax.

The issues discovered by JFrog essentially make it possible to bypass the scanner, present the scanned model files as safe, and enable malicious code to be executed, which could then pave the way for a supply chain attack.

Cybersecurity

“Each discovered vulnerability enables attackers to evade PickleScan’s malware detection and potentially execute a large-scale supply chain attack by distributing malicious ML models that conceal undetectable malicious code,” security researcher David Cohen said.

Picklescan, at its core, works by examining the pickle files at bytecode level and checking the results against a blocklist of known hazardous imports and operations to flag similar behavior. This approach, as opposed to allowlisting, also means that it prevents the tools from detecting any new attack vector and requires the developers to take into account all possible malicious behaviors.

The identified flaws are as follows –

  • CVE-2025-10155 (CVSS score: 9.3/7.8) – A file extension bypass vulnerability that can be used to undermine the scanner and load the model when providing a standard pickle file with a PyTorch-related extension such as .bin or .pt
  • CVE-2025-10156 (CVSS score: 9.3/7.5) – A bypass vulnerability that can be used to disable ZIP archive scanning by introducing a Cyclic Redundancy Check (CRC) error
  • CVE-2025-10157 (CVSS score: 9.3/8.3) – A bypass vulnerability that can be used to undermine Picklescan’s unsafe globals check, leading to arbitrary code execution by getting around a blocklist of dangerous imports

Successful exploitation of the aforementioned flaws could allow attackers to conceal malicious pickle payloads within files using common PyTorch extensions, deliberately introduce CRC errors into ZIP archives containing malicious models, or craft malicious PyTorch models with embedded pickle payloads to bypass the scanner.

Cybersecurity

Following responsible disclosure on June 29, 2025, the three vulnerabilities have been addressed in Picklescan version 0.0.31 released on September 9.

The findings illustrate some key systemic issues, including the reliance on a single scanning tool, discrepancies in file-handling behavior between security tools and PyTorch, thereby rendering security architectures vulnerable to attacks.

“AI libraries like PyTorch grow more complex by the day, introducing new features, model formats, and execution pathways faster than security scanning tools can adapt,” Cohen said. “This widening gap between innovation and protection leaves organizations exposed to emerging threats that conventional tools simply weren’t designed to anticipate.”

“Closing this gap requires a research-backed security proxy for AI models, continuously informed by experts who think like both attackers and defenders. By actively analyzing new models, tracking library updates, and uncovering novel exploitation techniques, this approach delivers adaptive, intelligence-driven protection against the vulnerabilities that matter most.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Best AirTag deal: Get a single Apple AirTag for .97 at Amazon Best AirTag deal: Get a single Apple AirTag for $17.97 at Amazon
Next Article Indian order to preload state-owned app on smartphones sparks political outcry Indian order to preload state-owned app on smartphones sparks political outcry
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

5 Telltale Signs You Need to Call a Professional Plumber (Before It’s Too Late)
5 Telltale Signs You Need to Call a Professional Plumber (Before It’s Too Late)
Gadget
Look AI makes the future of fashion design real-time, AI-powered, and in your hands · TechNode
Look AI makes the future of fashion design real-time, AI-powered, and in your hands · TechNode
Computing
Modo Energy seeks rapid expansion following £25m Series B – UKTN
Modo Energy seeks rapid expansion following £25m Series B – UKTN
News
Anti-immigrant material among AI-generated content getting billions of views on TikTok
Anti-immigrant material among AI-generated content getting billions of views on TikTok
News

You Might also Like

Look AI makes the future of fashion design real-time, AI-powered, and in your hands · TechNode
Computing

Look AI makes the future of fashion design real-time, AI-powered, and in your hands · TechNode

4 Min Read
Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems
Computing

Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems

4 Min Read
👨🏿‍🚀 Daily – 72 hours to report fraud |
Computing

👨🏿‍🚀 Daily – 72 hours to report fraud |

15 Min Read
Sony sues Tencent’s Light of Motiram for copying Horizon, Tencent agrees to suspend all marketing and public tests · TechNode
Computing

Sony sues Tencent’s Light of Motiram for copying Horizon, Tencent agrees to suspend all marketing and public tests · TechNode

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?