Deserialization of untrusted data can occur in versions of the Keras framework running versions 3.11.0 up to but not including 3.11.3, enabling a maliciously uploaded Keras file containing a TorchModuleWrapper class to run arbitrary code on an end user’s system when loaded despite safe mode being enabled. The vulnerability can be triggered through both local and remote files.
Metrics
Affected Vendors & Products
References
History
Fri, 17 Oct 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 17 Oct 2025 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Deserialization of untrusted data can occur in versions of the Keras framework running versions 3.11.0 up to but not including 3.11.3, enabling a maliciously uploaded Keras file containing a TorchModuleWrapper class to run arbitrary code on an end user’s system when loaded despite safe mode being enabled. The vulnerability can be triggered through both local and remote files. | |
Weaknesses | CWE-502 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: HiddenLayer
Published:
Updated: 2025-10-17T15:58:34.204Z
Reserved: 2025-06-09T13:58:25.617Z
Link: CVE-2025-49655

Updated: 2025-10-17T15:58:27.423Z

Status : Received
Published: 2025-10-17T16:15:37.420
Modified: 2025-10-17T16:15:37.420
Link: CVE-2025-49655

No data.

No data.