GHSA-3pwp-2fqj-6g2p: Duplicate Advisory: Qiskit allows arbitrary code execution decoding QPY format versions < 13
9.8
CVSS Score
3.1
Basic Information
CVE ID
-
GHSA ID
EPSS Score
-
CWE
Published
3/14/2025
Updated
3/14/2025
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| qiskit | pip | <= 1.4.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The advisory explicitly identifies qiskit.qpy.load() as the entry point for processing QPY files. The CWE-502 classification indicates insecure deserialization patterns. While exact implementation details aren't provided, the function's role in decoding serialized quantum programs and the documented attack vector (malicious QPY payloads) strongly suggest it uses Python's pickle or similar unsafe deserialization mechanisms internally when handling older QPY formats. The high confidence comes from multiple sources (IBM advisory, GHSA, NVD) directly linking this function to the vulnerability.