keras is vulnerable to Deserialization of Untrusted Data
78
High Risk
Affected versions of this package allow TFSMLayer to load external TensorFlow SavedModels during deserialization without honoring safe_mode, enabling attacker-controlled graphs to be registered and later executed during normal inference. An attacker could exploit this by supplying a malicious SavedModel (e.g., via a crafted config or model artifact) that bypasses safe_mode=True, causing unintended graph execution when the model is invoked, effectively violating Keras' safe deserialization guarantees and enabling execution of untrusted computation without explicit user opt-in.
You are affected if you are using a version that falls within the vulnerable range.
keras is vulnerable to Deserialization of Untrusted Data in versions 3.0.0 - 3.13.1.
Upgrade the keras library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant