Summary Vulnerability: Unsafe Deserialization via pickle.loads() in datapizza-ai Redis cache. Impact: Allows Remote Command Execution on the server host. CVSSv3: HIGH 7.9/10 CVSS: 3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H datapizza-ai Version: v0.0.7 Details Cause: Usage of vulnerable functions of pickle serialization library in file. Source: GitHub Link PoC Installation Steps Redis Server Proof of Concept Evil Class: Hex Representation: Redis Cache Poisoning: Python Program Command Injection Result (ls -alh): Impact Attackers can control Redis cache to subvert model behavior and inject fake outputs in cached queries. Arbitrary system commands execution possible (e.g., reverse shell). High impact as the attacker can completely take over the server host. References Python Pickle Documentation Credits Edoardo Ottavianelli [@edoardott]