CVE-2026-22608: Fickling vulnerable to use of ctypes and pydoc gadget chain to bypass detection
(updated )
Both ctypes and pydoc modules arent explictly blocked. Even other existing pickle scanning tools (like picklescan) do not block pydoc.locate. Chaining these two together can achieve RCE while the scanner still reports the file as LIKELY_SAFE
References
- github.com/advisories/GHSA-5hvc-6wx8-mvv4
- github.com/trailofbits/fickling
- github.com/trailofbits/fickling/blob/977b0769c13537cd96549c12bb537f05464cf09c/test/test_bypasses.py
- github.com/trailofbits/fickling/commit/b793563e60a5e039c5837b09d7f4f6b92e6040d1
- github.com/trailofbits/fickling/commit/d0b00d584afb5c58e38991cd544cb3889de90db6
- github.com/trailofbits/fickling/pull/195
- github.com/trailofbits/fickling/releases/tag/v0.1.7
- github.com/trailofbits/fickling/security/advisories/GHSA-5hvc-6wx8-mvv4
- nvd.nist.gov/vuln/detail/CVE-2026-22608
Code Behaviors & Features
Detect and mitigate CVE-2026-22608 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →