Ad

CVE-2026-5659

MEDIUM CVSS 4.0: 5.3 EPSS 0.05%
Updated Apr 07, 2026
pytries
Parameter Value
CVSS 5.3 (MEDIUM)
Type CWE-502 (Deserialization of Untrusted Data), CWE-20 (Improper Input Validation)
Vendor pytries
Public PoC No

A vulnerability was found in pytries datrie up to 0.8.3. The affected element is the function Trie.load/Trie.read/Trie.__setstate__ of the file src/datrie.pyx of the component trie File Handler. The manipulation results in deserialization.

The attack can be launched remotely. The exploit has been made public and could be used. The project was informed of the problem early through an issue report but has not responded yet.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Attack Requirements
None
No additional conditions
Privileges Required
None
No privileges needed
User Interaction
Passive
Minimal interaction

Impact Assessment

Confidentiality
Low
Partial data leak
Integrity
Low
Partial data modification
Availability
Low
Partial disruption

CVSS Vector v4.0