No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 19 May 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-502 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 18 May 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 17 May 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jsonpickle Project
Jsonpickle Project jsonpickle |
|
| Vendors & Products |
Jsonpickle Project
Jsonpickle Project jsonpickle |
Sat, 16 May 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | python jsonpickle 2.0.0 contains a remote code execution vulnerability that allows attackers to execute arbitrary Python commands by deserializing malicious JSON payloads containing py/repr objects. Attackers can craft JSON strings with py/repr directives that invoke the eval function during deserialization to execute system commands and arbitrary code. | |
| Title | python jsonpickle 2.0.0 Remote Code Execution via py/repr | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-18T17:01:06.050Z
Reserved: 2026-02-01T11:24:18.719Z
Link: CVE-2021-47952
Updated: 2026-05-18T17:00:50.531Z
Status : Deferred
Published: 2026-05-16T16:16:21.520
Modified: 2026-05-18T20:16:36.607
Link: CVE-2021-47952
OpenCVE Enrichment
Updated: 2026-05-19T02:00:14Z