A maliciously crafted QPY file can potential execute arbitrary-code embedded in the payload without privilege escalation when deserialising QPY formats < 13. A python process calling Qiskit 0.18.0 through 1.4.1's `qiskit.qpy.load()` function could potentially execute any arbitrary Python code embedded in the correct place in the binary file as part of specially constructed payload.
| Package (Ecosystem) | Introduced | Fixed | Limit |
|---|---|---|---|
| qiskit-terra(PyPI) | 0.18.0 | N/A | N/A |
| qiskit(PyPI) | 0 | 1.4.2 | N/A |
| qiskit(PyPI) | 2.0.0rc1 | 2.0.0rc2 | N/A |
CVSS Metrics