Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. monai
  4. ›
  5. CVE-2025-58757

CVE-2025-58757: Monai: Unsafe use of Pickle deserialization may lead to RCE

September 9, 2025 (updated September 26, 2025)

The pickle_operations function in monai/data/utils.py automatically handles dictionary key-value pairs ending with a specific suffix and deserializes them using pickle.loads() . This function also lacks any security measures.

When verified using the following proof-of-concept, arbitrary code execution can occur.

References

  • github.com/Project-MONAI/MONAI
  • github.com/Project-MONAI/MONAI/commit/948fbb703adcb87cd04ebd83d20dcd8d73bf6259
  • github.com/Project-MONAI/MONAI/pull/8566
  • github.com/Project-MONAI/MONAI/security/advisories/GHSA-p8cm-mm2v-gwjm
  • github.com/advisories/GHSA-p8cm-mm2v-gwjm
  • nvd.nist.gov/vuln/detail/CVE-2025-58757

Code Behaviors & Features

Detect and mitigate CVE-2025-58757 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.5.1

Fixed versions

  • 1.5.1

Solution

Upgrade to version 1.5.1 or above.

Impact 8.8 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-502: Deserialization of Untrusted Data

Source file

pypi/monai/CVE-2025-58757.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 18 Oct 2025 00:19:43 +0000.