The Keras Model.load_model function permits arbitrary code execution, even with safe_mode=True, through a manually constructed, malicious .keras archive. By altering the config.json file within the archive, an attacker can specify arbitrary Python modules and functions, along with their arguments, to be loaded and executed during model loading.
History

Wed, 12 Mar 2025 03:45:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}

threat_severity

Important


Tue, 11 Mar 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 11 Mar 2025 08:30:00 +0000

Type Values Removed Values Added
Description The Keras Model.load_model function permits arbitrary code execution, even with safe_mode=True, through a manually constructed, malicious .keras archive. By altering the config.json file within the archive, an attacker can specify arbitrary Python modules and functions, along with their arguments, to be loaded and executed during model loading.
Title Arbitrary Code Execution via Crafted Keras Config for Model Loading
Weaknesses CWE-94
References
Metrics cvssV4_0

{'score': 7.3, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Google

Published: 2025-03-11T08:12:34.974Z

Updated: 2025-03-11T14:10:22.002Z

Reserved: 2025-02-21T11:13:03.951Z

Link: CVE-2025-1550

cve-icon Vulnrichment

Updated: 2025-03-11T14:09:56.319Z

cve-icon NVD

Status : Received

Published: 2025-03-11T09:15:25.217

Modified: 2025-03-11T09:15:25.217

Link: CVE-2025-1550

cve-icon Redhat

Severity : Important

Publid Date: 2025-03-11T08:12:34Z

Links: CVE-2025-1550 - Bugzilla