{ "dataType": "CVE_RECORD", "dataVersion": "5.2", "cveMetadata": { "cveId": "CVE-2026-1462", "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "state": "PUBLISHED", "assignerShortName": "@huntr_ai", "dateReserved": "2026-01-27T04:14:51.848Z", "datePublished": "2026-04-13T14:55:28.649Z", "dateUpdated": "2026-04-13T18:53:12.291Z" }, "containers": { "cna": { "title": "Safe Mode Bypass in keras-team/keras", "providerMetadata": { "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntr_ai", "dateUpdated": "2026-04-13T14:55:28.649Z" }, "descriptions": [ { "lang": "en", "value": "A vulnerability in the `TFSMLayer` class of the `keras` package, version 3.13.0, allows attacker-controlled TensorFlow SavedModels to be loaded during deserialization of `.keras` models, even when `safe_mode=True`. This bypasses the security guarantees of `safe_mode` and enables arbitrary attacker-controlled code execution during model inference under the victim's privileges. The issue arises due to the unconditional loading of external SavedModels, serialization of attacker-controlled file paths, and the lack of validation in the `from_config()` method." } ], "affected": [ { "vendor": "keras-team", "product": "keras-team/keras", "versions": [ { "version": "unspecified", "lessThan": "3.13.2", "status": "affected", "versionType": "custom" } ] } ], "references": [ { "url": "https://huntr.com/bounties/7e78d6f1-6977-4300-b595-e81bdbda331c" }, { "url": "https://github.com/keras-team/keras/commit/b6773d3decaef1b05d8e794458e148cb362f163f" } ], "metrics": [ { "cvssV3_0": { "version": "3.0", "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "baseScore": 8.8, "baseSeverity": "HIGH" } } ], "problemTypes": [ { "descriptions": [ { "type": "CWE", "lang": "en", "description": "CWE-502 Deserialization of Untrusted Data", "cweId": "CWE-502" } ] } ], "source": { "advisory": "7e78d6f1-6977-4300-b595-e81bdbda331c", "discovery": "EXTERNAL" } }, "adp": [ { "metrics": [ { "other": { "type": "ssvc", "content": { "timestamp": "2026-04-13T18:53:01.058651Z", "id": "CVE-2026-1462", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "version": "2.0.3" } } } ], "title": "CISA ADP Vulnrichment", "providerMetadata": { "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2026-04-13T18:53:12.291Z" } } ] } }