<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Jsonpickle — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/jsonpickle/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 16 May 2026 16:17:25 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/jsonpickle/feed.xml" rel="self" type="application/rss+xml"/><item><title>jsonpickle 2.0.0 Remote Code Execution via Deserialization of Malicious Payloads</title><link>https://feed.craftedsignal.io/briefs/2026-05-jsonpickle-rce/</link><pubDate>Sat, 16 May 2026 16:17:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-jsonpickle-rce/</guid><description>jsonpickle version 2.0.0 contains a remote code execution vulnerability, allowing attackers to execute arbitrary Python commands by deserializing malicious JSON payloads containing py/repr objects, which invoke the eval function.</description><content:encoded><![CDATA[<p>jsonpickle version 2.0.0 is vulnerable to remote code execution. This vulnerability allows attackers to execute arbitrary Python commands by deserializing malicious JSON payloads that include <code>py/repr</code> objects. Attackers exploit this flaw by crafting JSON strings with <code>py/repr</code> directives that, when deserialized, invoke the <code>eval</code> function. This enables the execution of system commands and arbitrary code on systems that process these malicious JSON payloads. The vulnerability was published May 16th, 2026, and defenders should prioritize detection of malicious deserialization attempts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious JSON payload containing a <code>py/repr</code> object.</li>
<li>The <code>py/repr</code> object contains a Python expression designed for code execution.</li>
<li>The attacker sends the malicious JSON payload to a vulnerable application using jsonpickle 2.0.0.</li>
<li>The application uses jsonpickle&rsquo;s <code>decode</code> function to deserialize the JSON payload.</li>
<li>During deserialization, the <code>py/repr</code> directive is processed.</li>
<li>The <code>eval</code> function is invoked with the Python expression from the <code>py/repr</code> object.</li>
<li>The Python expression executes arbitrary code or commands on the server.</li>
<li>The attacker achieves remote code execution, potentially leading to full system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2021-47952 can lead to complete system compromise. Attackers can execute arbitrary code, potentially leading to data theft, system takeover, or denial of service. Given the critical CVSS score of 9.8, organizations using jsonpickle 2.0.0 are at high risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to a patched version of jsonpickle if available.</li>
<li>Deploy the Sigma rule &ldquo;Detect jsonpickle RCE via py/repr object&rdquo; to detect deserialization attempts.</li>
<li>Monitor application logs for errors related to JSON deserialization.</li>
<li>Implement input validation to sanitize JSON payloads before deserialization.</li>
<li>Consult the VulnCheck advisory for additional context on exploitation vectors.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>deserialization</category><category>remote code execution</category><category>cve-2021-47952</category></item></channel></rss>