CVE-2026-22609 PUBLISHED

Fickling has Static Analysis Bypass via Incomplete Dangerous Module Blocklist

Assigner: GitHub_M
Reserved: 07.01.2026 Published: 10.01.2026 Updated: 14.01.2026

Fickling is a Python pickling decompiler and static analyzer. Prior to version 0.1.7, the unsafe_imports() method in Fickling's static analyzer fails to flag several high-risk Python modules that can be used for arbitrary code execution. Malicious pickles importing these modules will not be detected as unsafe, allowing attackers to bypass Fickling's primary static safety checks. This issue has been patched in version 0.1.7.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
CVSS Score: 8.9

Product Status

Vendor trailofbits
Product fickling
Versions
  • Version < 0.1.7 is affected

References

Problem Types

  • CWE-184: Incomplete List of Disallowed Inputs CWE
  • CWE-502: Deserialization of Untrusted Data CWE