Severity:

HIGH RISK

(7.8)

Insufficient Unsafe Call Filtering in Pickle Scanner Leading to RCE (CWE-184/CWE-502) in Fickling

CVE-2026-22608

Published:

Jan 9, 2026

Status:

Analyzed

Summary

Affected Context

Exploit Preconditions

Why This Happens

Potential Impact

General Mitigation Guidance

How Teams Detect Issues Like This

Frequently Asked Questions

Source

NDV

Vulnerability Type

Vulnerability Type

Category:

Unsafe Deserialization with Incomplete Security Filtering

CWE:

CWE-184;CWE-502

Impact:

Remote Code Execution via Bypassed Pickle Safety Scan

Severity:

HIGH RISK

(7.8)

CVSS Version:

3.1

Vulnerability Type

Category:

Unsafe Deserialization with Incomplete Security Filtering

CWE:

CWE-184;CWE-502

Impact:

Remote Code Execution via Bypassed Pickle Safety Scan

Severity:

HIGH RISK

(7.8)

CVSS Version:

3.1

Catch This CVE While Code Is Being Written

Detect vulnerable code directly in pull requests, so CVEs are fixed before merge.