Duplicate Advisory: Picklescan Bypass is Possible via File Extension Mismatch
        
  Critical severity
        
          GitHub Reviewed
      
        Published
          Sep 17, 2025 
          to the GitHub Advisory Database
          •
          Updated Sep 17, 2025 
      
  
  
      Withdrawn
      This advisory was withdrawn on Sep 17, 2025
  
    
      Description
        Published by the National Vulnerability Database
      Sep 17, 2025 
    
  
        Published to the GitHub Advisory Database
      Sep 17, 2025 
    
  
        Reviewed
      Sep 17, 2025 
    
  
        Withdrawn
      Sep 17, 2025 
    
  
        Last updated
      Sep 17, 2025 
    
  
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-jgw4-cr84-mqxg. This link is maintained to preserve external references.
Original Description
An Improper Input Validation vulnerability in the scanning logic of mmaitre314 picklescan versions up to and including 0.0.30 allows a remote attacker to bypass pickle files security checks by supplying a standard pickle file with a PyTorch-related file extension. When the pickle file incorrectly considered safe is loaded, it can lead to the execution of malicious code.
References