GHSA-3pwp-2fqj-6g2p – qiskit
Package
Manager: pip
Name: qiskit
Vulnerable Version: <0
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: N/A
EPSS: N/A pctlN/A
Details
Duplicate Advisory: Qiskit allows arbitrary code execution decoding QPY format versions < 13 # Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-6m2c-76ff-6vrf. This link is maintained to preserve external references. # Original Description A maliciously crafted QPY file can potential execute arbitrary-code embedded in the payload without privilege escalation when deserialising QPY formats < 13. A python process calling Qiskit 0.18.0 through 1.4.1's `qiskit.qpy.load()` function could potentially execute any arbitrary Python code embedded in the correct place in the binary file as part of specially constructed payload.
Metadata
Created: 2025-03-14T15:32:03Z
Modified: 2025-03-14T19:56:01Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/03/GHSA-3pwp-2fqj-6g2p/GHSA-3pwp-2fqj-6g2p.json
CWE IDs: ["CWE-502"]
Alternative ID: N/A
Finding: N/A
Auto approve: 0