Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Trellix Source Code Breach: Hackers Access Repository
May 2, 2026
Hackers Exploit cPanel Flaw to Breach Government Military
May 2, 2026
Exim Mail Server Vulnerabilities Lead to Crash via DNS Data
May 2, 2026
Home/CyberSecurity News/Critical Vulnerability in Python PLY Library Enables Remote Code
CyberSecurity News

Critical Vulnerability in Python PLY Library Enables Remote Code

A critical vulnerability affecting PLY (Python Lex-Yacc) version 3.11, distributed via PyPI, has been uncovered. The flaw allows arbitrary code execution, exploiting unsafe deserialization of...

Marcus Rodriguez
Marcus Rodriguez
January 27, 2026 2 Min Read
0 0

A critical vulnerability affecting PLY (Python Lex-Yacc) version 3.11, distributed via PyPI, has been uncovered. The flaw allows arbitrary code execution, exploiting unsafe deserialization of untrusted pickle files.

The vulnerability, assigned CVE-2025-56005, affects the undocumented picklefile parameter in the yacc() function, which remains absent from official documentation despite being present in the production release.

The vulnerability stems from the yacc(picklefile=…) parameter invoking pickle.load() on attacker-controlled files without validation.

Python’s pickle module inherently supports arbitrary code execution during deserialization through the __reduce__() method, enabling malicious payloads to execute system commands before parser initialization occurs.

This presents a unique risk profile because the code execution happens silently during application startup, before any parsing logic is reached.

The vulnerability is particularly dangerous in environments where parser tables are cached on disk, shared between services, or generated in CI/CD pipelines.

Exploitation becomes possible when attackers can control, replace, or influence the pickle file path, such as:

Area / Component Description
Cached parser table locations Locations where parser tables are stored locally
Shared network directories Network-accessible shared folders
CI/CD pipeline artifacts Build and deployment output files
Configurable or writable file paths Application-defined writable paths

The vulnerability can be demonstrated through a malicious pickle payload that executes system commands during deserialization.

When yacc(picklefile=’exploit.pkl’) loads a crafted pickle file containing serialized objects with embedded __reduce__() methods, arbitrary code execution is guaranteed before the parser becomes operational.

According to the advisory, organizations should immediately implement the following mitigations:

Avoid using the picklefile parameter with untrusted or externally writable files. Disable loading parser tables from user-controlled locations.

Treat all pickle files as potentially unsafe input. Regenerate parser tables dynamically rather than loading from disk.

Developers should update applications that use PLY 3.11 and audit configurations for potential exposure through the undocumented parameter.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitVulnerability

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

APT Hackers Attack Indian Govt with GOGITTER & Attacking Government

Next Post

Multiple Vulnerabilities in React Server Components Enable DoS Attacks

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
cPanelSniper PoC Exploit for cPanel Vulner Disclosed Vulnerability
May 2, 2026
EtherRAT Targets Enterprise Admins with SEO Poison
May 1, 2026
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us