{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-22609","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2026-01-07T21:50:39.534Z","datePublished":"2026-01-10T01:35:18.152Z","dateUpdated":"2026-01-14T19:51:31.740Z"},"containers":{"cna":{"title":"Fickling has Static Analysis Bypass via Incomplete Dangerous Module Blocklist","problemTypes":[{"descriptions":[{"cweId":"CWE-184","lang":"en","description":"CWE-184: Incomplete List of Disallowed Inputs","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-502","lang":"en","description":"CWE-502: Deserialization of Untrusted Data","type":"CWE"}]}],"metrics":[{"cvssV4_0":{"attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","baseScore":8.9,"baseSeverity":"HIGH","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P","version":"4.0"}}],"references":[{"name":"https://github.com/trailofbits/fickling/security/advisories/GHSA-q5qq-mvfm-j35x","tags":["x_refsource_CONFIRM"],"url":"https://github.com/trailofbits/fickling/security/advisories/GHSA-q5qq-mvfm-j35x"},{"name":"https://github.com/trailofbits/fickling/commit/29d5545e74b07766892c1f0461b801afccee4f91","tags":["x_refsource_MISC"],"url":"https://github.com/trailofbits/fickling/commit/29d5545e74b07766892c1f0461b801afccee4f91"},{"name":"https://github.com/trailofbits/fickling/commit/9a2b3f89bd0598b528d62c10a64c1986fcb09f66","tags":["x_refsource_MISC"],"url":"https://github.com/trailofbits/fickling/commit/9a2b3f89bd0598b528d62c10a64c1986fcb09f66"},{"name":"https://github.com/trailofbits/fickling/commit/b793563e60a5e039c5837b09d7f4f6b92e6040d1","tags":["x_refsource_MISC"],"url":"https://github.com/trailofbits/fickling/commit/b793563e60a5e039c5837b09d7f4f6b92e6040d1"},{"name":"https://github.com/trailofbits/fickling/commit/eb299b453342f1931c787bcb3bc33f3a03a173f9","tags":["x_refsource_MISC"],"url":"https://github.com/trailofbits/fickling/commit/eb299b453342f1931c787bcb3bc33f3a03a173f9"},{"name":"https://github.com/trailofbits/fickling/releases/tag/v0.1.7","tags":["x_refsource_MISC"],"url":"https://github.com/trailofbits/fickling/releases/tag/v0.1.7"}],"affected":[{"vendor":"trailofbits","product":"fickling","versions":[{"version":"< 0.1.7","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-01-10T01:35:18.152Z"},"descriptions":[{"lang":"en","value":"Fickling is a Python pickling decompiler and static analyzer. Prior to version 0.1.7, the unsafe_imports() method in Fickling's static analyzer fails to flag several high-risk Python modules that can be used for arbitrary code execution. Malicious pickles importing these modules will not be detected as unsafe, allowing attackers to bypass Fickling's primary static safety checks. This issue has been patched in version 0.1.7."}],"source":{"advisory":"GHSA-q5qq-mvfm-j35x","discovery":"UNKNOWN"}},"adp":[{"references":[{"url":"https://github.com/trailofbits/fickling/security/advisories/GHSA-q5qq-mvfm-j35x","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-14T19:51:27.570854Z","id":"CVE-2026-22609","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-14T19:51:31.740Z"}}]}}