Miggo Logo

GHSA-3pwp-2fqj-6g2p: Duplicate Advisory: Qiskit allows arbitrary code execution decoding QPY format versions < 13

9.8

CVSS Score
3.1

Basic Information

CVE ID
-
EPSS Score
-
Published
3/14/2025
Updated
3/14/2025
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
qiskitpip<= 1.4.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The advisory explicitly identifies qiskit.qpy.load() as the entry point for processing QPY files. The CWE-502 classification indicates insecure deserialization patterns. While exact implementation details aren't provided, the function's role in decoding serialized quantum programs and the documented attack vector (malicious QPY payloads) strongly suggest it uses Python's pickle or similar unsafe deserialization mechanisms internally when handling older QPY formats. The high confidence comes from multiple sources (IBM advisory, GHSA, NVD) directly linking this function to the vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

# *upli**t* **visory T*is **visory **s ***n wit**r*wn ****us* it is * *upli**t* o* **S*-*m**-****-*vr*. T*is link is m*int*in** to pr*s*rv* *xt*rn*l r***r*n**s. # Ori*in*l **s*ription * m*li*iously *r**t** QPY *il* **n pot*nti*l *x**ut* *r*itr*ry-*o

Reasoning

T** **visory *xpli*itly i**nti*i*s `qiskit.qpy.lo**()` *s t** *ntry point *or pro**ssin* QPY *il*s. T** *W*-*** *l*ssi*i**tion in*i**t*s ins**ur* **s*ri*liz*tion p*tt*rns. W*il* *x**t impl*m*nt*tion **t*ils *r*n't provi***, t** *un*tion's rol* in ***