Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-5hvc-6wx8-mvv4 | Fickling vulnerable to use of ctypes and pydoc gadget chain to bypass detection |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 16 Jan 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:trailofbits:fickling:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Tue, 13 Jan 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 12 Jan 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Trailofbits
Trailofbits fickling |
|
| Vendors & Products |
Trailofbits
Trailofbits fickling |
Sat, 10 Jan 2026 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Fickling is a Python pickling decompiler and static analyzer. Prior to version 0.1.7, both ctypes and pydoc modules aren't explicitly blocked. Even other existing pickle scanning tools (like picklescan) do not block pydoc.locate. Chaining these two together can achieve RCE while the scanner still reports the file as LIKELY_SAFE. This issue has been patched in version 0.1.7. | |
| Title | Fickling vulnerable to use of ctypes and pydoc gadget chain to bypass detection | |
| Weaknesses | CWE-184 CWE-502 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-13T19:57:12.040Z
Reserved: 2026-01-07T21:50:39.534Z
Link: CVE-2026-22608
Updated: 2026-01-13T19:56:56.479Z
Status : Analyzed
Published: 2026-01-10T02:15:49.917
Modified: 2026-01-16T18:57:26.013
Link: CVE-2026-22608
No data.
OpenCVE Enrichment
Updated: 2026-01-12T14:36:39Z
Github GHSA