Deserialization of untrusted data can occur in versions of the Keras framework running versions 3.11.0 up to but not including 3.11.3, enabling a maliciously uploaded Keras file containing a TorchModuleWrapper class to run arbitrary code on an end user’s system when loaded despite safe mode being enabled. The vulnerability can be triggered through both local and remote files.
Metrics
Affected Vendors & Products
References
History
Tue, 21 Oct 2025 00:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | keras: Keras deserialization of untrusted data | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 20 Oct 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Keras
Keras keras |
|
| Vendors & Products |
Keras
Keras keras |
Fri, 17 Oct 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 17 Oct 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Deserialization of untrusted data can occur in versions of the Keras framework running versions 3.11.0 up to but not including 3.11.3, enabling a maliciously uploaded Keras file containing a TorchModuleWrapper class to run arbitrary code on an end user’s system when loaded despite safe mode being enabled. The vulnerability can be triggered through both local and remote files. | |
| Weaknesses | CWE-502 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: HiddenLayer
Published: 2025-10-17T15:20:27.308Z
Updated: 2025-10-17T15:58:34.204Z
Reserved: 2025-06-09T13:58:25.617Z
Link: CVE-2025-49655
Updated: 2025-10-17T15:58:27.423Z
Status : Awaiting Analysis
Published: 2025-10-17T16:15:37.420
Modified: 2025-10-21T19:31:50.020
Link: CVE-2025-49655