Ultimate Guide: CVE-2026-22609 - Fickling has Static Analysis Bypass via Incomplete Dangerous Module Blocklist

Ultimate Guide: CVE-2026-22609 - Fickling has Static Analysis Bypass via Incomplete Dangerous Module Blocklist

CVE ID : CVE-2026-22609 Published : Jan. 10, 2026, 2:15 a.m. | 1 hour, 17 minutes ago Description : Fickling is a Python pickling decompiler and static analyzer. Prior to version 0.1.7, the unsafe_imports() method in Fickling's static analyzer fails to flag several high-risk Python modules that can be used for arbitrary code execution. Malicious pickles importing these modules will not be detected as unsafe, allowing attackers to bypass Fickling's primary static safety checks. This issue has been patched in version 0.1.7. Severity: 8.9 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVE Details

Severity
HIGH
Published
Jan. 10, 2026
Affected Product: Python
Impact: code execution

Source: Telegram CVE Monitor