A maliciously crafted QPY file can potentially execute arbitrary-code embedded in the payload without privilege escalation when deserializing QPY formats < 13. A python process calling Qiskit's qiskit.qpy.load() function could potentially execute any arbitrary Python code embedded in the correct place in the binary file as part of a specially constructed payload.
Fixed in Qiskit 1.4.2 and in Qiskit 2.0.0rc2
{
"github_reviewed": true,
"severity": "CRITICAL",
"cwe_ids": [
"CWE-502"
],
"nvd_published_at": null,
"github_reviewed_at": "2025-03-14T19:56:14Z"
}