python jsonpickle 2.0.0 contains a remote code execution vulnerability that allows attackers to execute arbitrary Python commands by deserializing malicious JSON payloads containing py/repr objects. Attackers can craft JSON strings with py/repr directives that invoke the eval function during deserialization to execute system commands and arbitrary code.
Metrics
Affected Vendors & Products
References
History
Sat, 16 May 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | python jsonpickle 2.0.0 contains a remote code execution vulnerability that allows attackers to execute arbitrary Python commands by deserializing malicious JSON payloads containing py/repr objects. Attackers can craft JSON strings with py/repr directives that invoke the eval function during deserialization to execute system commands and arbitrary code. | |
| Title | python jsonpickle 2.0.0 Remote Code Execution via py/repr | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-16T15:26:06.248Z
Reserved: 2026-02-01T11:24:18.719Z
Link: CVE-2021-47952
No data.
Status : Received
Published: 2026-05-16T16:16:21.520
Modified: 2026-05-16T16:16:21.520
Link: CVE-2021-47952
No data.
OpenCVE Enrichment
Updated: 2026-05-16T16:30:27Z