CVE-2026-22607: Fickling Blocklist Bypass: cProfile.run()
(updated )
Fickling versions up to and including 0.1.6 do not treat Python’s cProfile module as unsafe. Because of this, a malicious pickle that uses cProfile.run() is classified as SUSPICIOUS instead of OVERTLY_MALICIOUS.
If a user relies on Fickling’s output to decide whether a pickle is safe to deserialize, this misclassification can lead them to execute attacker-controlled code on their system.
This affects any workflow or product that uses Fickling as a security gate for pickle deserialization.
References
- github.com/advisories/GHSA-p523-jq9w-64x9
- github.com/trailofbits/fickling
- github.com/trailofbits/fickling/blob/977b0769c13537cd96549c12bb537f05464cf09c/test/test_bypasses.py
- github.com/trailofbits/fickling/commit/dc8ae12966edee27a78fe05c5745171a2b138d43
- github.com/trailofbits/fickling/pull/108
- github.com/trailofbits/fickling/pull/187
- github.com/trailofbits/fickling/pull/195
- github.com/trailofbits/fickling/releases/tag/v0.1.7
- github.com/trailofbits/fickling/security/advisories/GHSA-565g-hwwr-4pp3
- github.com/trailofbits/fickling/security/advisories/GHSA-p523-jq9w-64x9
- github.com/trailofbits/fickling/security/advisories/GHSA-r7v6-mfhq-g3m2
- nvd.nist.gov/vuln/detail/CVE-2026-22607
Code Behaviors & Features
Detect and mitigate CVE-2026-22607 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →