Unsafe Pickle Deserialization
CRITICALUnsafe pickle deserialization: Untrusted data flows to pickle.loads() which can execute arbitrary code. Use json.loads() instead.
Rule Information
Language
Python
Category
Deserialization
Author
Code Pathfinder
Last Updated
2026-01-17
Tags
pythondeserializationpicklerceuntrusted-dataowasp-a08cwe-502remote-code-executioncriticalsecurityintra-procedural
CWE References
CVE References