Intel

AIKIDO-2026-10071

pydash is vulnerable to Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') Pre-CVE
Found by Aikido Intel before public disclosure or CVE publication.

66

Medium Risk

This Affects:

PYTHONpydash
6.0.0 - 8.0.5
Fixed in 8.0.6

TL;DR

Affected versions of this package are vulnerable to Unsafe Reflection via invoke() Validation Bypass, where the invoke() function skips the validation logic intended to restrict access to internal attributes such as __globals__ or __builtins__, allowing for unsafe reflection. An attacker could exploit this by crafting malicious inputs to invoke() to access these internals, potentially leading to information disclosure or remote code execution.

Who does this affect?

You are affected if you are using a version that falls within the vulnerable range.

Background info

pydash is vulnerable to Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') in versions 6.0.0 - 8.0.5.

How to fix this

Upgrade the pydash library to a patch version.