Picklescan is vulnerable to RCE via missing detection when calling numpy.f2py.crackfortran.getlincoef
High severity
GitHub Reviewed
Published
Dec 27, 2025
in
mmaitre314/picklescan
•
Updated Dec 30, 2025
Description
Published to the GitHub Advisory Database
Dec 30, 2025
Reviewed
Dec 30, 2025
Last updated
Dec 30, 2025
Summary
Picklescan uses the
numpy.f2py.crackfortran.getlincoeffunction (a NumPy F2PY helper) to execute arbitrary Python code during unpickling.Details
Picklescan fails to detect a malicious pickle that uses the gadget
numpy.f2py.crackfortran.getlincoefin__reduce__, allowing arbitrary command execution when the pickle is loaded. A crafted object returns this function plus attacker‑controlled arguments; the scan reports the file as safe, but pickle.load() triggers execution.PoC
Impact
Credits
References