CVE-2025-46183
Published: 24 October 2025
Summary
CVE-2025-46183 is a high-severity Deserialization of Untrusted Data (CWE-502) vulnerability. Its CVSS base score is 8.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 30.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires timely identification, reporting, and correction of the insecure deserialization flaw in pgCodeKeeper's Utils.deserialize function.
Mandates validation of untrusted serialized inputs like .ser files to block specially crafted payloads leading to code execution.
Implements memory protections such as non-executable memory regions to mitigate arbitrary code execution from deserialization exploits.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability allows remote, unauthenticated exploitation of a public-facing deserialization flaw (CWE-502) in pgCodeKeeper, leading to arbitrary code execution, directly mapping to Exploit Public-Facing Application.
NVD Description
The Utils.deserialize function in pgCodeKeeper 10.12.0 processes serialized data from untrusted sources. If an attacker provides a specially crafted .ser file, deserialization may result in unintended code execution or other malicious behavior on the target system.
Deeper analysisAI
CVE-2025-46183 is an insecure deserialization vulnerability in the Utils.deserialize function of pgCodeKeeper version 10.12.0. The function processes serialized data from untrusted sources, allowing a specially crafted .ser file to trigger unintended code execution or other malicious behavior on the target system. It carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N) and maps to CWE-502: Deserialization of Untrusted Data.
Remote attackers require no privileges or user interaction to exploit this vulnerability over the network with low complexity. By supplying a malicious .ser file to the deserialization process, they can achieve arbitrary code execution or similar malicious effects, leading to high integrity impact such as data tampering and low confidentiality impact.
Mitigation details are available in the disclosure advisory at https://github.com/hacktimepro/vulnerabilities/blob/main/Disclosure_CVE-2025-46183_pgcodekeeper.md.
Details
- CWE(s)