Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. picklescan
  4. ›
  5. GHSA-4675-36f9-wf6r

GHSA-4675-36f9-wf6r: Picklescan does not block ctypes

December 29, 2025

Picklescan doesnt flag ctypes module as a dangerous module, which is a huge issue. ctypes is basically a foreign function interface library and can be used to

  • Load DLLs
  • Call C functions directly
  • Manipulate memory raw pointers.

This can allow attackers to achieve RCE by invoking direct syscalls without going through blocked modules. Another major issue that ctypes being allowed presents is that it can be used down the line to dismantle interpreter based python sandboxes as ctypes allow direct access to raw memory.

This is a more severe loophole than normal gadget chains and bypasses as raw memory access can be used for a lot of nefarious purposes down the line if left undetected

References

  • github.com/advisories/GHSA-4675-36f9-wf6r
  • github.com/mmaitre314/picklescan
  • github.com/mmaitre314/picklescan/commit/70c1c6c31beb6baaf52c8db1b6c3c0e84a6f9dab
  • github.com/mmaitre314/picklescan/pull/53
  • github.com/mmaitre314/picklescan/releases/tag/v0.0.33
  • github.com/mmaitre314/picklescan/security/advisories/GHSA-4675-36f9-wf6r

Code Behaviors & Features

Detect and mitigate GHSA-4675-36f9-wf6r with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.0.33

Fixed versions

  • 0.0.33

Solution

Upgrade to version 0.0.33 or above.

Impact 9.8 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-184: Incomplete List of Disallowed Inputs
  • CWE-913: Improper Control of Dynamically-Managed Code Resources

Source file

pypi/picklescan/GHSA-4675-36f9-wf6r.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 04 Feb 2026 00:35:10 +0000.