Duplicate Advisory: Keras arbitrary code execution vulnerability
High severity
GitHub Reviewed
Published
Mar 11, 2025
to the GitHub Advisory Database
•
Updated Mar 11, 2025
Withdrawn
This advisory was withdrawn on Mar 11, 2025
Description
Published by the National Vulnerability Database
Mar 11, 2025
Published to the GitHub Advisory Database
Mar 11, 2025
Reviewed
Mar 11, 2025
Withdrawn
Mar 11, 2025
Last updated
Mar 11, 2025
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-48g7-3x6r-xfhp. This link is maintained to preserve external references.
Original Description
The Keras Model.load_model function permits arbitrary code execution, even with safe_mode=True, through a manually constructed, malicious .keras archive. By altering the config.json file within the archive, an attacker can specify arbitrary Python modules and functions, along with their arguments, to be loaded and executed during model loading.
References