{ "schema_version": "1.4.0", "id": "GHSA-5478-v2w6-c6q7", "modified": "2025-03-11T20:07:24Z", "published": "2025-03-11T09:30:30Z", "withdrawn": "2025-03-11T20:07:23Z", "aliases": [], "summary": "Duplicate Advisory: Keras arbitrary code execution vulnerability", "details": "# Duplicate Advisory\nThis advisory has been withdrawn because it is a duplicate of GHSA-48g7-3x6r-xfhp. This link is maintained to preserve external references.\n\n# Original Description\n\nThe Keras Model.load_model function permits arbitrary code execution, even with safe_mode=True, through a manually constructed, malicious .keras archive. By altering the config.json file within the archive, an attacker can specify arbitrary Python modules and functions, along with their arguments, to be loaded and executed during model loading.", "severity": [ { "type": "CVSS_V4", "score": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" } ], "affected": [ { "package": { "ecosystem": "PyPI", "name": "keras" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "3.9.0" } ] } ] } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-1550" }, { "type": "WEB", "url": "https://github.com/keras-team/keras/pull/20751" }, { "type": "WEB", "url": "https://github.com/keras-team/keras/commit/e67ac8ffd0c883bec68eb65bb52340c7f9d3a903" }, { "type": "PACKAGE", "url": "https://github.com/keras-team/keras" }, { "type": "WEB", "url": "https://github.com/keras-team/keras/releases/tag/v3.9.0" } ], "database_specific": { "cwe_ids": [ "CWE-94" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2025-03-11T16:17:06Z", "nvd_published_at": "2025-03-11T09:15:25Z" } }