Keras framework vulnerable to deserialization of untrusted data
Critical severity
GitHub Reviewed
Published
Oct 17, 2025
to the GitHub Advisory Database
•
Updated Oct 17, 2025
Description
Published by the National Vulnerability Database
Oct 17, 2025
Published to the GitHub Advisory Database
Oct 17, 2025
Reviewed
Oct 17, 2025
Last updated
Oct 17, 2025
Deserialization of untrusted data can occur in versions of the Keras framework running versions 3.11.0 up to but not including 3.11.3, enabling a maliciously uploaded Keras file containing a TorchModuleWrapper class to run arbitrary code on an end user’s system when loaded despite safe mode being enabled. The vulnerability can be triggered through both local and remote files.
References