CVE-2025-2000
14.03.2025, 13:15
A maliciously crafted QPY file can potential execute arbitrary-code embedded in the payload without privilege escalation when deserialising QPY formats < 13. A python process calling Qiskit 0.18.0 through 1.4.1's `qiskit.qpy.load()` function could potentially execute any arbitrary Python code embedded in the correct place in the binary file as part of specially constructed payload.Enginsight
Vendor | Product | Version |
---|---|---|
ibm | qiskit | 0.18.0 ≤ 𝑥 < 1.4.2 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration