{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-22608","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2026-01-07T21:50:39.534Z","datePublished":"2026-01-10T01:35:11.291Z","dateUpdated":"2026-01-13T19:57:12.040Z"},"containers":{"cna":{"title":"Fickling vulnerable to use of ctypes and pydoc gadget chain to bypass detection","problemTypes":[{"descriptions":[{"cweId":"CWE-184","lang":"en","description":"CWE-184: Incomplete List of Disallowed Inputs","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-502","lang":"en","description":"CWE-502: Deserialization of Untrusted Data","type":"CWE"}]}],"metrics":[{"cvssV4_0":{"attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","baseScore":8.9,"baseSeverity":"HIGH","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P","version":"4.0"}}],"references":[{"name":"https://github.com/trailofbits/fickling/security/advisories/GHSA-5hvc-6wx8-mvv4","tags":["x_refsource_CONFIRM"],"url":"https://github.com/trailofbits/fickling/security/advisories/GHSA-5hvc-6wx8-mvv4"},{"name":"https://github.com/trailofbits/fickling/commit/b793563e60a5e039c5837b09d7f4f6b92e6040d1","tags":["x_refsource_MISC"],"url":"https://github.com/trailofbits/fickling/commit/b793563e60a5e039c5837b09d7f4f6b92e6040d1"},{"name":"https://github.com/trailofbits/fickling/releases/tag/v0.1.7","tags":["x_refsource_MISC"],"url":"https://github.com/trailofbits/fickling/releases/tag/v0.1.7"}],"affected":[{"vendor":"trailofbits","product":"fickling","versions":[{"version":"< 0.1.7","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-01-10T01:35:11.291Z"},"descriptions":[{"lang":"en","value":"Fickling is a Python pickling decompiler and static analyzer. Prior to version 0.1.7, both ctypes and pydoc modules aren't explicitly blocked. Even other existing pickle scanning tools (like picklescan) do not block pydoc.locate. Chaining these two together can achieve RCE while the scanner still reports the file as LIKELY_SAFE. This issue has been patched in version 0.1.7."}],"source":{"advisory":"GHSA-5hvc-6wx8-mvv4","discovery":"UNKNOWN"}},"adp":[{"references":[{"url":"https://github.com/trailofbits/fickling/security/advisories/GHSA-5hvc-6wx8-mvv4","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-13T19:57:08.459855Z","id":"CVE-2026-22608","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-13T19:57:12.040Z"}}]}}