A maliciously crafted QPY file can potential execute arbitrary-code embedded in the payload without privilege escalation when deserialising QPY formats < 13. A python process calling Qiskit 0.18.0 through 1.4.1's `qiskit.qpy.load()` function could potentially execute any arbitrary Python code embedded in the correct place in the binary file as part of specially constructed payload.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.ibm.com/support/pages/node/7185949 |
![]() ![]() |
History
Fri, 25 Jul 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Ibm
Ibm qiskit |
|
CPEs | cpe:2.3:a:ibm:qiskit:0.18.0:*:*:*:*:*:*:* cpe:2.3:a:ibm:qiskit:1.4.1:*:*:*:*:*:*:* |
|
Vendors & Products |
Ibm
Ibm qiskit |
Mon, 14 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Fri, 14 Mar 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 14 Mar 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A maliciously crafted QPY file can potential execute arbitrary-code embedded in the payload without privilege escalation when deserialising QPY formats < 13. A python process calling Qiskit 0.18.0 through 1.4.1's `qiskit.qpy.load()` function could potentially execute any arbitrary Python code embedded in the correct place in the binary file as part of specially constructed payload. | |
Title | Qiskit SDK code execution | |
Weaknesses | CWE-502 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: ibm
Published: 2025-03-14T13:04:46.351Z
Updated: 2025-07-25T16:03:19.676Z
Reserved: 2025-03-05T16:10:36.949Z
Link: CVE-2025-2000

Updated: 2025-03-14T13:28:16.074Z

Status : Received
Published: 2025-03-14T13:15:40.907
Modified: 2025-03-14T13:15:40.907
Link: CVE-2025-2000

No data.