CVE-2026-22606: Fickling has a bypass via runpy.run_path() and runpy.run_module()
(updated )
Fickling versions up to and including 0.1.6 do not treat Python’s runpy module as unsafe. Because of this, a malicious pickle that uses runpy.run_path() or runpy.run_module() is classified as SUSPICIOUS instead of OVERTLY_MALICIOUS.
If a user relies on Fickling’s output to decide whether a pickle is safe to deserialize, this misclassification can lead them to execute attacker-controlled code on their system.
This affects any workflow or product that uses Fickling as a security gate for pickle deserialization.
References
- github.com/advisories/GHSA-wfq2-52f7-7qvj
- github.com/trailofbits/fickling
- github.com/trailofbits/fickling/blob/977b0769c13537cd96549c12bb537f05464cf09c/test/test_bypasses.py
- github.com/trailofbits/fickling/commit/9a2b3f89bd0598b528d62c10a64c1986fcb09f66
- github.com/trailofbits/fickling/pull/108
- github.com/trailofbits/fickling/pull/187
- github.com/trailofbits/fickling/pull/195
- github.com/trailofbits/fickling/releases/tag/v0.1.7
- github.com/trailofbits/fickling/security/advisories/GHSA-565g-hwwr-4pp3
- github.com/trailofbits/fickling/security/advisories/GHSA-r7v6-mfhq-g3m2
- github.com/trailofbits/fickling/security/advisories/GHSA-wfq2-52f7-7qvj
- nvd.nist.gov/vuln/detail/CVE-2026-22606
Code Behaviors & Features
Detect and mitigate CVE-2026-22606 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →