diff --git a/advisories/unreviewed/2026/05/GHSA-m5gw-83w2-7749/GHSA-m5gw-83w2-7749.json b/advisories/unreviewed/2026/05/GHSA-m5gw-83w2-7749/GHSA-m5gw-83w2-7749.json index c608d3785a35d..70c30b48da0f6 100644 --- a/advisories/unreviewed/2026/05/GHSA-m5gw-83w2-7749/GHSA-m5gw-83w2-7749.json +++ b/advisories/unreviewed/2026/05/GHSA-m5gw-83w2-7749/GHSA-m5gw-83w2-7749.json @@ -6,6 +6,7 @@ "aliases": [ "CVE-2026-48207" ], + "summary": "PyFory ReduceSerializer DeserializationPolicy bypass", "details": "Deserialization of untrusted data in Apache Fory PyFory. PyFory's ReduceSerializer could bypass documented DeserializationPolicy validation hooks during reduce-state restoration and global-name resolution. An application is vulnerable if it deserializes attacker-controlled data using PyFory Python-native mode with strict mode disabled and relies on DeserializationPolicy to restrict unsafe classes, functions, or module attributes.\n\nThis issue affects Apache Fory: from before 1.0.0.\n\nMitigation: Users of Apache Fory are recommended to upgrade to version 1.0.0 or later, which enforces DeserializationPolicy validation for the affected ReduceSerializer paths and thus fixes this issue.", "severity": [ { @@ -13,7 +14,27 @@ "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], - "affected": [], + "affected": [ + { + "package": { + "ecosystem": "PyPI", + "name": "pyfory" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0.13.0" + }, + { + "fixed": "1.0.0" + } + ] + } + ] + } + ], "references": [ { "type": "ADVISORY",