
oss-sec mailing list archives
CVE-2025-61622: Apache Fory: Python RCE via unguarded pickle fallback serializer in pyfory
From: Chaokun Yang <chaokunyang () apache org>
Date: Mon, 29 Sep 2025 07:01:46 +0000
Severity: critical Affected versions: - Apache Fory (pyfory,pyfury) 0.5.0 through 0.12.2 Description: Deserialization of untrusted data in python in pyfory versions 0.12.0 through 0.12.2 allows arbitrary code execution. An application is vulnerable if it reads pyfory serialized data from untrusted sources. An attacker can craft a data stream that selects pickle-fallback serializer during deserialization, leading to the execution of `pickle.loads`, which is vulnerable to remote code execution. Users are recommended to upgrade to version 0.12.3 or later, which has removed pickle fallback serializer and thus fixes this issue. Credit: Mapta / BugBunny_ai (reporter) References: https://fory.apache.org https://www.cve.org/CVERecord?id=CVE-2025-61622
Current thread:
- CVE-2025-61622: Apache Fory: Python RCE via unguarded pickle fallback serializer in pyfory Chaokun Yang (Sep 29)