Arbitrary Code Execution in Keras ML Framework
CVE-2025-1550
7.3HIGH
Summary
The Keras library's Model.load_model function is susceptible to an arbitrary code execution vulnerability. This issue arises when a malicious actor crafts a specific .keras archive that alters the config.json file within it. By doing so, they can instruct the model to load and execute arbitrary Python modules and functions, along with specified arguments, even when the safe_mode is enabled. This can potentially compromise the integrity of applications utilizing Keras, making it crucial for users to ensure they are using patched versions of the framework to mitigate this risk.
Affected Version(s)
Keras 3.0.0 < 3.8.0
References
CVSS V4
Score:
7.3
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
Unknown
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Gabriele Digregorio