CVE-2025-69872
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Description
DiskCache (python-diskcache) through 5.6.3 uses Python pickle for serialization by default. An attacker with write access to the cache directory can achieve arbitrary code execution when a victim application reads from the cache.
Analysis
Unsafe deserialization in DiskCache Python library through 5.6.3. Uses pickle by default, allowing attackers with cache directory write access to execute arbitrary code.
Technical Context
CWE-94 code injection through Python pickle deserialization. DiskCache uses pickle as default serializer for its file-based cache.
Affected Products
['DiskCache (python-diskcache) <= 5.6.3']
Remediation
Update DiskCache. Switch to a safe serializer (JSON). Restrict cache directory permissions.
Priority Score
Vendor Status
Share
External POC / Exploit Code
Leaving vuln.today
GHSA-w8v5-vhqr-4h9v