The vulnerability stems from the default use of Python's pickle module for serialization in the diskcache library. The pickle module is known to be insecure and can execute arbitrary code when deserializing specially crafted data. An attacker with write permissions to the cache directory can replace a benign cache file with a malicious one containing a pickled payload. When the application using diskcache attempts to retrieve the cached item, it will trigger the deserialization of the malicious payload, resulting in arbitrary code execution. The analysis of the diskcache/core.py source code confirms that the Disk.fetch and Disk.get methods use pickle.load to deserialize data. These methods are called by public-facing methods of the Cache class like get, pop, __getitem__, and others, which are the typical entry points for an application to interact with the cache. The vulnerability exists in all versions up to and including 5.6.3 when using the default Disk storage backend. The recommended mitigation is to use a safer serialization format, like the provided JSONDisk class, if the cache storage cannot be protected from attackers.