In the documentation of Python's jsonpickle module for JSON serialization and deserialization it states that
Loading a JSON string from an untrusted source represents a potential security vulnerability. jsonpickle makes no attempt to sanitize the input
But I wonder how is it possible for an attacker to execute arbitrary code via JSON messages?
Also, what is the best way to sanitize the input as suggested in the documentation? JSON data in my application is not trust-worthy (it came from the clients that send JSON messages).