CVE-2025-12058
BaseFortify
Publication date: 2025-10-29
Last updated on: 2025-10-30
Assigner: Google Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| keras | keras | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-502 | The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability affects the Keras.Model.load_model method, where loading a specially crafted .keras model file can lead to arbitrary local file reading and Server-Side Request Forgery (SSRF). It arises because the StringLookup layer's vocabulary argument can specify local or remote file paths. When loading the model, Keras reads these paths without proper restriction, even when safe_mode=True is set, allowing attackers to read local files or make the server fetch data from arbitrary network locations.
How can this vulnerability impact me? :
An attacker exploiting this vulnerability can read arbitrary local files on the server hosting the Keras model, potentially exposing sensitive information. Additionally, the attacker can cause the server to make network requests to arbitrary endpoints (SSRF), which could be used to access internal services, perform reconnaissance, or launch further attacks within the network.