VYPR
Moderate severityNVD Advisory· Published Oct 31, 2025· Updated Oct 31, 2025

CVE-2025-63675

CVE-2025-63675

Description

cryptidy through 1.2.4 allows code execution via untrusted data because pickle.loads is used. This occurs in aes_decrypt_message in symmetric_encryption.py.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

cryptidy <=1.2.4 uses pickle.loads in aes_decrypt_message, enabling remote code execution via crafted encrypted data.

Vulnerability

Overview

The cryptidy Python library (versions up to and including 1.2.4) contains a critical deserialization vulnerability in its symmetric encryption module. The function aes_decrypt_message in symmetric_encryption.py calls pickle.loads on decrypted data without any validation or sanitization [1][3]. This constitutes CWE-502: Deserialization of Untrusted Data, as the library implicitly trusts the decrypted payload to be a safe Python object.

Attack

Vector

An attacker can exploit this flaw by providing a maliciously crafted encrypted message to any application that uses cryptidy to decrypt data. When the victim application decrypts the message and passes the result to pickle.loads, arbitrary Python code embedded in the pickle payload is executed [1]. No authentication or special network position is required if the attacker can supply the encrypted data directly (e.g., via an API endpoint or file upload). The proof-of-concept repository demonstrates a payload that opens a calculator, but real-world payloads could execute arbitrary commands [1].

Impact

Successful exploitation leads to remote code execution (RCE) with the privileges of the process running cryptidy. This can result in full system compromise, data exfiltration, denial of service, or privilege escalation [1]. The library is designed for easy encryption of Python objects, making it attractive for applications that need to serialize and encrypt data; however, the use of pickle undermines security.

Mitigation

As of the latest release (1.2.4), no patch has been published to address this vulnerability [4]. Users are advised to avoid using cryptidy to decrypt data from untrusted sources. If possible, switch to a serialization format that does not execute code (e.g., JSON or msgpack) and ensure that any decrypted data is validated before use. The maintainer has not yet responded with a fix, so applications relying on cryptidy should consider it unsafe for handling attacker-controlled input.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
cryptidyPyPI
<= 1.2.4

Affected products

2
  • Cryptidy/Cryptidyllm-fuzzy2 versions
    <=1.2.4+ 1 more
    • (no CPE)range: <=1.2.4
    • (no CPE)range: 0

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.