Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-49655

Опубликовано: 17 окт. 2025
Источник: debian
EPSS Низкий

Описание

Deserialization of untrusted data can occur in versions of the Keras framework running versions 3.11.0 up to but not including 3.11.3, enabling a maliciously uploaded Keras file containing a TorchModuleWrapper class to run arbitrary code on an end user’s system when loaded despite safe mode being enabled. The vulnerability can be triggered through both local and remote files.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
kerasremovedpackage
kerasignoredbullseyepackage

Примечания

  • https://github.com/keras-team/keras/pull/21575

EPSS

Процентиль: 19%
0.00061
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
4 месяца назад

Deserialization of untrusted data can occur in versions of the Keras framework running versions 3.11.0 up to but not including 3.11.3, enabling a maliciously uploaded Keras file containing a TorchModuleWrapper class to run arbitrary code on an end user’s system when loaded despite safe mode being enabled. The vulnerability can be triggered through both local and remote files.

CVSS3: 9.8
nvd
4 месяца назад

Deserialization of untrusted data can occur in versions of the Keras framework running versions 3.11.0 up to but not including 3.11.3, enabling a maliciously uploaded Keras file containing a TorchModuleWrapper class to run arbitrary code on an end user’s system when loaded despite safe mode being enabled. The vulnerability can be triggered through both local and remote files.

CVSS3: 9.8
github
4 месяца назад

Keras framework vulnerable to deserialization of untrusted data

EPSS

Процентиль: 19%
0.00061
Низкий