CVE-2025-2000
A maliciously crafted QPY file can potential execute arbitrary-code embedded in the payload without privilege escalation when deserialising QPY formats < 13. A python process calling Qiskit 0.18.0 through 1.4.1's `qiskit.qpy.load()` function could potentially execute any arbitrary Python code embedded in the correct place in the binary file as part of specially constructed payload.
Vendor
Product
CWE
Yayın Tarihi
2025-03-14 13:15:40
Güncelleme
2025-08-18 18:19:55
Source Identifier
psirt@us.ibm.com
KEV Date Added
-