cryptidy through 1.2.4 allows code execution via untrusted data because pickle.loads is used. This occurs in aesdecryptmessage in symmetric_encryption.py.
{ "versions": [ { "introduced": "0" }, { "last_affected": "1.2.4" } ] }
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-63675.json"