Deserialization of untrusted data in python in pyfory versions 0.12.0 through 0.12.2, or the legacy pyfury versions from 0.1.0 through 0.10.3: allows arbitrary code execution. An application is vulnerable if it reads pyfory serialized data from untrusted sources. An attacker can craft a data stream that selects pickle-fallback serializer during deserialization, leading to the execution of `pickle.loads`, which is vulnerable to remote code execution.
Users are recommended to upgrade to pyfory version 0.12.3 or later, which has removed pickle fallback serializer and thus fixes this issue.
References
| Link | Resource |
|---|---|
| https://lists.apache.org/thread/vfn9hp9qt06db5yo1gmj3l114o3o2csd | Issue Tracking Vendor Advisory |
| http://www.openwall.com/lists/oss-security/2025/09/29/3 | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-10-01 10:15
Updated : 2025-12-03 21:52
NVD link : CVE-2025-61622
Mitre link : CVE-2025-61622
CVE.ORG link : CVE-2025-61622
JSON object : View
Products Affected
apache
- fory
CWE
CWE-502
Deserialization of Untrusted Data
