VYPR

PyPI package

keras

pkg:pypi/keras

Vulnerabilities (13)

  • CVE-2026-1462HigApr 13, 2026
    affected < 3.13.2fixed 3.13.2

    A vulnerability in the `TFSMLayer` class of the `keras` package, version 3.13.0, allows attacker-controlled TensorFlow SavedModels to be loaded during deserialization of `.keras` models, even when `safe_mode=True`. This bypasses the security guarantees of `safe_mode` and enables

  • CVE-2026-1669Feb 11, 2026
    affected >= 3.13.0, < 3.13.2fixed 3.13.2

    Arbitrary file read in the model loading mechanism (HDF5 integration) in Keras versions 3.0.0 through 3.13.1 on all supported platforms allows a remote attacker to read local files and disclose sensitive information via a crafted .keras model file utilizing HDF5 external dataset

  • CVE-2026-0897Jan 15, 2026
    affected >= 3.0.0, < 3.12.1fixed 3.12.1

    Allocation of Resources Without Limits or Throttling in the HDF5 weight loading component in Google Keras 3.0.0 through 3.13.0 on all platforms allows a remote attacker to cause a Denial of Service (DoS) through memory exhaustion and a crash of the Python interpreter via a crafte

  • CVE-2025-12638HigNov 28, 2025
    affected < 3.12.0fixed 3.12.0

    Keras version 3.11.3 is affected by a path traversal vulnerability in the keras.utils.get_file() function when extracting tar archives. The vulnerability arises because the function uses Python's tarfile.extractall() method without the security-critical filter='data' parameter. A

  • CVE-2025-12060HigOct 30, 2025
    affected < 3.12.0fixed 3.12.0

    The keras.utils.get_file API in Keras, when used with the extract=True option for tar archives, is vulnerable to a path traversal attack. The utility uses Python's tarfile.extractall function without the filter="data" feature. A remote attacker can craft a malicious tar archive c

  • CVE-2025-12058MedOct 29, 2025
    affected < 3.12.0fixed 3.12.0

    The Keras.Model.load_model method, including when executed with the intended security mitigation safe_mode=True, is vulnerable to arbitrary local file loading and Server-Side Request Forgery (SSRF). This vulnerability stems from the way the StringLookup layer is handled during

  • CVE-2025-49655CriOct 17, 2025
    affected >= 3.11.0, < 3.11.3fixed 3.11.3

    Deserialization of untrusted data can occur in versions of the Keras framework running versions 3.11.0 up to but not including 3.11.3, enabling a maliciously uploaded Keras file containing a TorchModuleWrapper class to run arbitrary code on an end user’s system when loaded despit

  • CVE-2025-9905Sep 19, 2025
    affected >= 3.0.0, < 3.11.3fixed 3.11.3

    The Keras Model.load_model method can be exploited to achieve arbitrary code execution, even with safe_mode=True. One can create a specially crafted .h5/.hdf5 model archive that, when loaded via Model.load_model, will trigger arbitrary code to be executed. This is achieved by c

  • CVE-2025-9906Sep 19, 2025
    affected < 3.11.0fixed 3.11.0

    The Keras Model.load_model method can be exploited to achieve arbitrary code execution, even with safe_mode=True. One can create a specially crafted .keras model archive that, when loaded via Model.load_model, will trigger arbitrary code to be executed. This is achieved by craft

  • CVE-2025-8747Aug 11, 2025
    affected >= 3.0.0, < 3.11.0fixed 3.11.0

    A safe mode bypass vulnerability in the `Model.load_model` method in Keras versions 3.0.0 through 3.10.0 allows an attacker to achieve arbitrary code execution by convincing a user to load a specially crafted `.keras` model archive.

  • CVE-2025-1550Mar 11, 2025
    affected >= 3.0.0, < 3.9.0fixed 3.9.0

    The Keras Model.load_model function permits arbitrary code execution, even with safe_mode=True, through a manually constructed, malicious .keras archive. By altering the config.json file within the archive, an attacker can specify arbitrary Python modules and functions, along wit

  • CVE-2024-55459Jan 8, 2025
    affected <= 3.7.0

    An issue in keras 3.7.0 allows attackers to write arbitrary files to the user's machine via downloading a crafted tar file through the get_file function.

  • CVE-2024-3660Apr 16, 2024
    affected < 2.13.1rc0fixed 2.13.1rc0

    A arbitrary code injection vulnerability in TensorFlow's Keras framework (<2.13) allows attackers to execute arbitrary code with the same permissions as the application using a model that allow arbitrary code irrespective of the application.