CRITICAL SeverityCVSS 4.09.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVE-2021-47952
Last updated May 16, 2026 · Published May 16, 2026
Description
python jsonpickle 2.0.0 contains a remote code execution vulnerability that allows attackers to execute arbitrary Python commands by deserializing malicious JSON payloads containing py/repr objects. Attackers can craft JSON strings with py/repr directives that invoke the eval function during deserialization to execute system commands and arbitrary code.
Affected products
1 listed- Jsonpickle:python jsonpickle
Mappings
CWE
CWE-94
CAPEC
None listed.
Related
Research
CVE® content © MITRE Corporation. Licensed under the CVE Terms of Use. Terms
