CWE-351
Insufficient Type Distinction
The product does not properly distinguish between different types of elements in a way that leads to insecure behavior.
CVE-2025-54412 (GCVE-0-2025-54412)
Vulnerability from cvelistv5
Published
2025-07-26 03:29
Modified
2025-07-28 13:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-351 - Insufficient Type Distinction
Summary
skops is a Python library which helps users share and ship their scikit-learn based models. Versions 0.11.0 and below contain a inconsistency in the OperatorFuncNode which can be exploited to hide the execution of untrusted operator methods. This can then be used in a code reuse attack to invoke seemingly safe functions and escalate to arbitrary code execution with minimal and misleading trusted types. This is fixed in version 0.12.0.
References
▼ | URL | Tags |
---|---|---|
https://github.com/skops-dev/skops/security/advisories/GHSA-m7f4-hrc6-fwg3 | x_refsource_CONFIRM | |
https://github.com/skops-dev/skops/commit/0aeca055509dfb48c1506870aabdd9e247adf603 | x_refsource_MISC | |
https://github.com/skops-dev/skops/releases/tag/v0.12.0 | x_refsource_MISC |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-54412", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-07-28T13:55:45.240203Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-28T13:55:57.057Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "skops", "vendor": "skops-dev", "versions": [ { "status": "affected", "version": "\u003c 0.12.0" } ] } ], "descriptions": [ { "lang": "en", "value": "skops is a Python library which helps users share and ship their scikit-learn based models. Versions 0.11.0 and below contain a inconsistency in the OperatorFuncNode which can be exploited to hide the execution of untrusted operator methods. This can then be used in a code reuse attack to invoke seemingly safe functions and escalate to arbitrary code execution with minimal and misleading trusted types. This is fixed in version 0.12.0." } ], "metrics": [ { "cvssV4_0": { "attackComplexity": "LOW", "attackRequirements": "PRESENT", "attackVector": "LOCAL", "baseScore": 8.7, "baseSeverity": "HIGH", "privilegesRequired": "NONE", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "HIGH", "userInteraction": "ACTIVE", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-351", "description": "CWE-351: Insufficient Type Distinction", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-26T03:29:10.918Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/skops-dev/skops/security/advisories/GHSA-m7f4-hrc6-fwg3", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/skops-dev/skops/security/advisories/GHSA-m7f4-hrc6-fwg3" }, { "name": "https://github.com/skops-dev/skops/commit/0aeca055509dfb48c1506870aabdd9e247adf603", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/skops-dev/skops/commit/0aeca055509dfb48c1506870aabdd9e247adf603" }, { "name": "https://github.com/skops-dev/skops/releases/tag/v0.12.0", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/skops-dev/skops/releases/tag/v0.12.0" } ], "source": { "advisory": "GHSA-m7f4-hrc6-fwg3", "discovery": "UNKNOWN" }, "title": "skops\u0027 Inconsistent Trusted Type Validation Enables Hidden `operator` Methods Execution" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-54412", "datePublished": "2025-07-26T03:29:10.918Z", "dateReserved": "2025-07-21T23:18:10.280Z", "dateUpdated": "2025-07-28T13:55:57.057Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-54413 (GCVE-0-2025-54413)
Vulnerability from cvelistv5
Published
2025-07-26 03:29
Modified
2025-07-28 13:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-351 - Insufficient Type Distinction
Summary
skops is a Python library which helps users share and ship their scikit-learn based models. Versions 0.11.0 and below contain an inconsistency in MethodNode, which can be exploited to access unexpected object fields through dot notation. This can be used to achieve arbitrary code execution at load time. While this issue may seem similar to GHSA-m7f4-hrc6-fwg3, it is actually more severe, as it relies on fewer assumptions about trusted types. This is fixed in version 12.0.0.
References
▼ | URL | Tags |
---|---|---|
https://github.com/skops-dev/skops/security/advisories/GHSA-4v6w-xpmh-gfgp | x_refsource_CONFIRM | |
https://github.com/skops-dev/skops/security/advisories/GHSA-m7f4-hrc6-fwg3 | x_refsource_MISC | |
https://github.com/skops-dev/skops/commit/0aeca055509dfb48c1506870aabdd9e247adf603 | x_refsource_MISC | |
https://drive.google.com/drive/folders/1bmVV18mnPbWy21hVYgf51yVJpf78vtB_?usp=sharing | x_refsource_MISC | |
https://github.com/skops-dev/skops/releases/tag/v0.12.0 | x_refsource_MISC |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-54413", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-07-28T13:59:46.714447Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-28T13:59:58.255Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "skops", "vendor": "skops-dev", "versions": [ { "status": "affected", "version": "\u003c 12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "skops is a Python library which helps users share and ship their scikit-learn based models. Versions 0.11.0 and below contain an inconsistency in MethodNode, which can be exploited to access unexpected object fields through dot notation. This can be used to achieve arbitrary code execution at load time. While this issue may seem similar to GHSA-m7f4-hrc6-fwg3, it is actually more severe, as it relies on fewer assumptions about trusted types. This is fixed in version 12.0.0." } ], "metrics": [ { "cvssV4_0": { "attackComplexity": "LOW", "attackRequirements": "PRESENT", "attackVector": "LOCAL", "baseScore": 8.7, "baseSeverity": "HIGH", "privilegesRequired": "NONE", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "HIGH", "userInteraction": "ACTIVE", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-351", "description": "CWE-351: Insufficient Type Distinction", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-26T03:29:43.716Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/skops-dev/skops/security/advisories/GHSA-4v6w-xpmh-gfgp", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/skops-dev/skops/security/advisories/GHSA-4v6w-xpmh-gfgp" }, { "name": "https://github.com/skops-dev/skops/security/advisories/GHSA-m7f4-hrc6-fwg3", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/skops-dev/skops/security/advisories/GHSA-m7f4-hrc6-fwg3" }, { "name": "https://github.com/skops-dev/skops/commit/0aeca055509dfb48c1506870aabdd9e247adf603", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/skops-dev/skops/commit/0aeca055509dfb48c1506870aabdd9e247adf603" }, { "name": "https://drive.google.com/drive/folders/1bmVV18mnPbWy21hVYgf51yVJpf78vtB_?usp=sharing", "tags": [ "x_refsource_MISC" ], "url": "https://drive.google.com/drive/folders/1bmVV18mnPbWy21hVYgf51yVJpf78vtB_?usp=sharing" }, { "name": "https://github.com/skops-dev/skops/releases/tag/v0.12.0", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/skops-dev/skops/releases/tag/v0.12.0" } ], "source": { "advisory": "GHSA-4v6w-xpmh-gfgp", "discovery": "UNKNOWN" }, "title": "skops\u0027 MethodNode can access unexpected object fields through dot notation, leading to arbitrary code execution at load time" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-54413", "datePublished": "2025-07-26T03:29:43.716Z", "dateReserved": "2025-07-21T23:18:10.280Z", "dateUpdated": "2025-07-28T13:59:58.255Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
No mitigation information available for this CWE.
No CAPEC attack patterns related to this CWE.