The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-1716

CVE-2025-1716: Mmaitre314 Picklescan RCE Vulnerability

CVE-2025-1716 is a remote code execution vulnerability in Mmaitre314 Picklescan that allows attackers to bypass security checks and install malicious PyPI packages. This article covers technical details, affected versions, and mitigations.

Updated: January 22, 2026

CVE-2025-1716 Overview

CVE-2025-1716 is an insecure deserialization vulnerability in picklescan before version 0.0.21 that fails to treat pip as an unsafe global. This oversight allows attackers to craft malicious machine learning models that use Python's Pickle serialization format to execute arbitrary package installations via pip.main(). Because picklescan is specifically designed to detect unsafe Pickle objects in ML models, this bypass effectively negates its security purpose, allowing malicious models to pass security checks and appear safe when they could execute harmful code.

Critical Impact

Malicious ML models can bypass picklescan security scanning and execute arbitrary pip commands to install backdoored packages from PyPI or GitHub, potentially compromising ML pipelines and development environments.

Affected Products

  • mmaitre314 picklescan versions prior to 0.0.21
  • Applications and ML pipelines using vulnerable picklescan versions for model validation
  • Hugging Face Hub and similar model repositories relying on picklescan for security scanning

Discovery Timeline

  • February 26, 2025 - CVE-2025-1716 published to NVD
  • December 29, 2025 - Last updated in NVD database

Technical Details for CVE-2025-1716

Vulnerability Analysis

This vulnerability stems from an incomplete blocklist implementation in picklescan's security scanning mechanism. Picklescan is a security tool designed to detect potentially dangerous Pickle files, particularly in the context of machine learning model files that commonly use Pickle serialization. The tool maintains a list of "unsafe globals" - Python modules and functions that could be exploited when a Pickle file is deserialized.

The core issue is that picklescan's unsafe globals list did not include pip, Python's package installer module. This allows an attacker to create a Pickle payload that calls pip.main() with arbitrary arguments, effectively enabling remote code execution through package installation. When a model containing such a payload is scanned with the vulnerable version of picklescan, it passes all security checks despite containing dangerous code.

Root Cause

The root cause is classified under CWE-184: Incomplete List of Disallowed Inputs. The picklescan scanner maintained a blocklist of unsafe Python globals (such as bdb, pdb, and asyncio) but failed to include pip in this list. This incomplete allowlist/blocklist approach is a common security pattern failure where defenders must anticipate all possible attack vectors.

The pip module is particularly dangerous because:

  • It can download and execute arbitrary Python code from PyPI or URLs
  • It runs with the privileges of the current user
  • Package installation often includes post-install scripts that execute automatically

Attack Vector

An attacker can exploit this vulnerability by crafting a malicious ML model file that contains a specially constructed Pickle payload. The attack flow works as follows:

  1. Attacker creates a Pickle payload that invokes pip.main(['install', 'malicious-package'])
  2. The malicious package is hosted on PyPI, GitHub, or any accessible URL
  3. The attacker distributes the model through ML model sharing platforms
  4. When a victim downloads and scans the model with vulnerable picklescan, it passes security checks
  5. Upon deserialization (model loading), the Pickle payload executes and installs the malicious package
  6. The malicious package's code executes in the victim's environment

The following patch was applied to fix this vulnerability by adding pip to the unsafe globals list:

python
     "bdb": "*",
     "pdb": "*",
     "asyncio": "*",
+    "pip": "*",
 }
 
 #

Source: GitHub Commit

Detection Methods for CVE-2025-1716

Indicators of Compromise

  • Unexpected network connections to PyPI (pypi.org) or GitHub during model loading operations
  • Unusual pip installation activity in ML pipeline logs or environments
  • New or unexpected Python packages appearing in virtual environments after loading untrusted models
  • Process execution logs showing pip.main() calls originating from model deserialization

Detection Strategies

  • Monitor for pip subprocess execution during model loading operations in ML pipelines
  • Implement file integrity monitoring on Python site-packages directories
  • Deploy network monitoring rules to detect unexpected PyPI connections from ML infrastructure
  • Audit picklescan version in CI/CD pipelines and model validation workflows

Monitoring Recommendations

  • Enable verbose logging in ML model loading frameworks to capture deserialization events
  • Configure alerts for unexpected package installations in production ML environments
  • Review model provenance and maintain a trusted model registry with hash verification
  • Implement runtime monitoring for pip executions in containerized ML workloads

How to Mitigate CVE-2025-1716

Immediate Actions Required

  • Upgrade picklescan to version 0.0.21 or later immediately across all environments
  • Re-scan all previously validated ML models with the patched picklescan version
  • Quarantine any models that fail the updated security scan until further analysis
  • Review audit logs for evidence of malicious package installations from model loading

Patch Information

The vulnerability is fixed in picklescan version 0.0.21. The patch adds pip to the list of unsafe globals in src/picklescan/scanner.py, preventing Pickle payloads from invoking pip functionality. The fix is available via the GitHub commit 78ce704. For detailed information, refer to the GitHub Security Advisory GHSA-655q-fx9r-782v.

Workarounds

  • Isolate ML model loading in sandboxed environments with no network access
  • Implement network egress filtering to block pip and PyPI connections from model processing systems
  • Use alternative model formats (ONNX, SavedModel) that don't rely on Pickle serialization where possible
  • Deploy additional security scanning layers beyond picklescan for defense in depth
bash
# Upgrade picklescan to patched version
pip install --upgrade picklescan>=0.0.21

# Verify installed version
pip show picklescan | grep Version

# Re-scan existing models after upgrade
picklescan --path /path/to/models/

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechMmaitre314 Picklescan

  • SeverityMEDIUM

  • CVSS Score5.3

  • EPSS Probability4.25%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityLow
  • AvailabilityNone
  • CWE References
  • CWE-184
  • Technical References
  • Sonatype CVE-2025-1716 Advisory
  • Vendor Resources
  • GitHub Commit Update

  • GitHub Security Advisory GHSA-655q
  • Related CVEs
  • CVE-2025-1945: Mmaitre314 Picklescan RCE Vulnerability

  • CVE-2025-10156: Mmaitre314 Picklescan RCE Vulnerability

  • CVE-2025-1889: Picklescan Information Disclosure Flaw
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English