CVE-2026-1669
- EPSS 0.01%
- Veröffentlicht 11.02.2026 22:10:10
- Zuletzt bearbeitet 26.02.2026 23:23:59
Arbitrary file read in the model loading mechanism (HDF5 integration) in Keras versions 3.0.0 through 3.13.1 on all supported platforms allows a remote attacker to read local files and disclose sensitive information via a crafted .keras model file ut...
CVE-2026-0897
- EPSS 0.03%
- Veröffentlicht 15.01.2026 14:09:53
- Zuletzt bearbeitet 23.01.2026 18:35:49
Allocation of Resources Without Limits or Throttling in the HDF5 weight loading component in Google Keras 3.0.0 through 3.13.0 on all platforms allows a remote attacker to cause a Denial of Service (DoS) through memory exhaustion and a crash of the P...
CVE-2025-12060
- EPSS 0.12%
- Veröffentlicht 30.10.2025 17:15:37
- Zuletzt bearbeitet 04.11.2025 15:41:56
The keras.utils.get_file API in Keras, when used with the extract=True option for tar archives, is vulnerable to a path traversal attack. The utility uses Python's tarfile.extractall function without the filter="data" feature. A remote attacker can c...
CVE-2025-12058
- EPSS 0.08%
- Veröffentlicht 29.10.2025 08:48:29
- Zuletzt bearbeitet 30.10.2025 15:03:13
The Keras.Model.load_model method, including when executed with the intended security mitigation safe_mode=True, is vulnerable to arbitrary local file loading and Server-Side Request Forgery (SSRF). This vulnerability stems from the way the StringL...
CVE-2025-49655
- EPSS 0.1%
- Veröffentlicht 17.10.2025 15:20:27
- Zuletzt bearbeitet 21.10.2025 19:31:50
Deserialization of untrusted data can occur in versions of the Keras framework running versions 3.11.0 up to but not including 3.11.3, enabling a maliciously uploaded Keras file containing a TorchModuleWrapper class to run arbitrary code on an end us...
CVE-2025-9905
- EPSS 0.01%
- Veröffentlicht 19.09.2025 08:16:44
- Zuletzt bearbeitet 23.09.2025 16:53:40
The Keras Model.load_model method can be exploited to achieve arbitrary code execution, even with safe_mode=True. One can create a specially crafted .h5/.hdf5 model archive that, when loaded via Model.load_model, will trigger arbitrary code to be ex...
CVE-2025-9906
- EPSS 0.08%
- Veröffentlicht 19.09.2025 08:15:04
- Zuletzt bearbeitet 23.09.2025 16:53:28
The Keras Model.load_model method can be exploited to achieve arbitrary code execution, even with safe_mode=True. One can create a specially crafted .keras model archive that, when loaded via Model.load_model, will trigger arbitrary code to be execu...
CVE-2025-8747
- EPSS 0.01%
- Veröffentlicht 11.08.2025 07:21:16
- Zuletzt bearbeitet 14.08.2025 16:24:41
A safe mode bypass vulnerability in the `Model.load_model` method in Keras versions 3.0.0 through 3.10.0 allows an attacker to achieve arbitrary code execution by convincing a user to load a specially crafted `.keras` model archive.
CVE-2025-1550
- EPSS 4.79%
- Veröffentlicht 11.03.2025 08:12:34
- Zuletzt bearbeitet 31.07.2025 16:55:39
The Keras Model.load_model function permits arbitrary code execution, even with safe_mode=True, through a manually constructed, malicious .keras archive. By altering the config.json file within the archive, an attacker can specify arbitrary Python mo...
CVE-2024-55459
- EPSS 0.15%
- Veröffentlicht 08.01.2025 17:15:15
- Zuletzt bearbeitet 22.09.2025 17:47:22
An issue in keras 3.7.0 allows attackers to write arbitrary files to the user's machine via downloading a crafted tar file through the get_file function.