Intel

AIKIDO-2026-10137

keras is vulnerable to Deserialization of Untrusted Data

Deserialization of Untrusted Data Pre-CVE
Found by Aikido Intel before public disclosure or CVE publication.

78

High Risk

This Affects:

PYTHONkeras
3.0.0 - 3.13.1
Fixed in 3.13.2

TL;DR

Affected versions of this package allow TFSMLayer to load external TensorFlow SavedModels during deserialization without honoring safe_mode, enabling attacker-controlled graphs to be registered and later executed during normal inference. An attacker could exploit this by supplying a malicious SavedModel (e.g., via a crafted config or model artifact) that bypasses safe_mode=True, causing unintended graph execution when the model is invoked, effectively violating Keras' safe deserialization guarantees and enabling execution of untrusted computation without explicit user opt-in.

Who does this affect?

You are affected if you are using a version that falls within the vulnerable range.

Background info

keras is vulnerable to Deserialization of Untrusted Data in versions 3.0.0 - 3.13.1.

How to fix this

Upgrade the keras library to the patch version.