Arbitrary Code Execution in Keras ML Framework
CVE-2025-1550

7.3HIGH

Key Information:

Vendor
Google
Status
Vendor
CVE Published:
11 March 2025

Summary

The Keras library's Model.load_model function is susceptible to an arbitrary code execution vulnerability. This issue arises when a malicious actor crafts a specific .keras archive that alters the config.json file within it. By doing so, they can instruct the model to load and execute arbitrary Python modules and functions, along with specified arguments, even when the safe_mode is enabled. This can potentially compromise the integrity of applications utilizing Keras, making it crucial for users to ensure they are using patched versions of the framework to mitigate this risk.

Affected Version(s)

Keras 3.0.0 < 3.8.0

References

CVSS V4

Score:
7.3
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Gabriele Digregorio
.