CVE-2026-31223 - Vulnerability Analysis
HighCVSS: 8.8Last Updated: May 13, 2026
snorkel - Insecure Deserialization
Published: May 12, 2026Updated: May 13, 2026Remote Exploitable
Overview
snorkel <= 0.10.0 contains an insecure deserialization vulnerability caused by unsafe use of pickle.load() in BaseLabeler.load(), letting remote attackers execute arbitrary code via crafted pickle files, exploit requires attacker to supply malicious file.
Severity & Score
Severity: High
CVSS Score: 8.8
Impact
Remote attackers can execute arbitrary code on the victim system, potentially leading to full system compromise.
Mitigation
Update to the latest version of snorkel that fixes this vulnerability.
References
Related Resources
Details
- CVE ID
- CVE-2026-31223
- Severity
- High
- CVSS Score
- 8.8
- Type
- insecure_deserialization
- Status
- confirmed
CWE
- CWE-502
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H