Cyber Posture

CVE-2025-46183

High

Published: 24 October 2025

Published
24 October 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
EPSS Score 0.0012 30.5th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-46183 is an insecure deserialization vulnerability in the Utils.deserialize function of pgCodeKeeper version 10.12.0. The function processes serialized data from untrusted sources, allowing a specially crafted .ser file to trigger unintended code execution or other malicious behavior on the target system. It carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N) and maps to CWE-502: Deserialization of Untrusted Data.

Remote attackers require no privileges or user interaction to exploit this vulnerability over the network with low complexity. By supplying a malicious .ser file to the deserialization process, they can achieve arbitrary code execution or similar malicious effects, leading to high integrity impact such as data tampering and low confidentiality impact.

Mitigation details are available in the disclosure advisory at https://github.com/hacktimepro/vulnerabilities/blob/main/Disclosure_CVE-2025-46183_pgcodekeeper.md.

Details

CWE(s)
CWE-502

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability allows remote, unauthenticated exploitation of a public-facing deserialization flaw (CWE-502) in pgCodeKeeper, leading to arbitrary code execution, directly mapping to Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References