CVE-2025-49655
BaseFortify
Publication date: 2025-10-17
Last updated on: 2025-10-21
Assigner: HiddenLayer
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| keras | keras | 3.11.2 |
| keras | keras | 3.11.1 |
| keras | keras | 3.11.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-502 | The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Keras framework versions 3.11.0 up to but not including 3.11.3, where deserialization of untrusted data can occur. A maliciously crafted Keras file containing a TorchModuleWrapper class can be uploaded and, when loaded, can execute arbitrary code on the user's system even if safe mode is enabled. This can happen with both local and remote files.
How can this vulnerability impact me? :
The vulnerability can allow an attacker to run arbitrary code on your system without any user interaction or privileges, potentially leading to full compromise of confidentiality, integrity, and availability of your system and data.