CVE-2025-58367
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-05

Last updated on: 2025-09-08

Assigner: GitHub, Inc.

Description
DeepDiff is a project focused on Deep Difference and search of any Python data. Versions 5.0.0 through 8.6.0 are vulnerable to class pollution via the Delta class constructor, and when combined with a gadget available in DeltaDiff, it can lead to Denial of Service and Remote Code Execution (via insecure Pickle deserialization) exploitation. The gadget available in DeepDiff allows `deepdiff.serialization.SAFE_TO_IMPORT` to be modified to allow dangerous classes such as posix.system, and then perform insecure Pickle deserialization via the Delta class. This potentially allows any Python code to be executed, given that the input to Delta is user-controlled. Depending on the application where DeepDiff is used, this can also lead to other vulnerabilities. This is fixed in version 8.6.1.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-05
Last Modified
2025-09-08
Generated
2026-05-06
AI Q&A
2025-09-06
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
seperman deepdiff 8.6.1
seperman deepdiff 5.0.0
seperman deepdiff 8.6.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-915 The product receives input from an upstream component that specifies multiple attributes, properties, or fields that are to be initialized or updated in an object, but it does not properly control which attributes can be modified.
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?

Upgrade DeepDiff to version 8.6.1 or later, as this version contains the fix for the vulnerability. Avoid using vulnerable versions (5.0.0 through 8.6.0) especially in environments where user-controlled input is passed to the Delta class constructor. Additionally, avoid insecure Pickle deserialization and do not allow modification of deepdiff.serialization.SAFE_TO_IMPORT to include dangerous classes.


Can you explain this vulnerability to me?

This vulnerability affects DeepDiff versions 5.0.0 through 8.6.0 and involves class pollution via the Delta class constructor. When combined with a gadget in DeltaDiff, it can lead to Denial of Service and Remote Code Execution through insecure Pickle deserialization. The vulnerability allows modification of deepdiff.serialization.SAFE_TO_IMPORT to include dangerous classes like posix.system, enabling execution of arbitrary Python code if the input to Delta is user-controlled. It is fixed in version 8.6.1.


How can this vulnerability impact me? :

This vulnerability can allow an attacker to execute arbitrary Python code remotely, potentially causing Denial of Service or full Remote Code Execution on systems using vulnerable versions of DeepDiff. This can compromise the security and integrity of the affected application and its environment.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart