Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2025-1550

Опубликовано: 01 авг. 2025
Источник: msrc
CVSS3: 9.8
EPSS Низкий

Описание

Arbitrary Code Execution via Crafted Keras Config for Model Loading

EPSS

Процентиль: 91%
0.07385
Низкий

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
8 месяцев назад

The Keras Model.load_model function permits arbitrary code execution, even with safe_mode=True, through a manually constructed, malicious .keras archive. By altering the config.json file within the archive, an attacker can specify arbitrary Python modules and functions, along with their arguments, to be loaded and executed during model loading.

CVSS3: 8.2
redhat
8 месяцев назад

The Keras Model.load_model function permits arbitrary code execution, even with safe_mode=True, through a manually constructed, malicious .keras archive. By altering the config.json file within the archive, an attacker can specify arbitrary Python modules and functions, along with their arguments, to be loaded and executed during model loading.

CVSS3: 9.8
nvd
8 месяцев назад

The Keras Model.load_model function permits arbitrary code execution, even with safe_mode=True, through a manually constructed, malicious .keras archive. By altering the config.json file within the archive, an attacker can specify arbitrary Python modules and functions, along with their arguments, to be loaded and executed during model loading.

CVSS3: 9.8
debian
8 месяцев назад

The Keras Model.load_model function permits arbitrary code execution, ...

github
8 месяцев назад

Arbitrary Code Execution via Crafted Keras Config for Model Loading

EPSS

Процентиль: 91%
0.07385
Низкий

9.8 Critical

CVSS3