CVE-2025-49655
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-17

Last updated on: 2025-10-21

Assigner: HiddenLayer

Description
Deserialization of untrusted data can occur in versions of the Keras framework running versions 3.11.0 up to but not including 3.11.3, enabling a maliciously uploaded Keras file containing a TorchModuleWrapper class to run arbitrary code on an end user’s system when loaded despite safe mode being enabled. The vulnerability can be triggered through both local and remote files.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-17
Last Modified
2025-10-21
Generated
2026-05-07
AI Q&A
2025-10-17
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
keras keras 3.11.2
keras keras 3.11.1
keras keras 3.11.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-502 The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability involves the Keras framework versions 3.11.0 up to but not including 3.11.3, where deserialization of untrusted data can occur. A maliciously crafted Keras file containing a TorchModuleWrapper class can be uploaded and, when loaded, can execute arbitrary code on the user's system even if safe mode is enabled. This can happen with both local and remote files.


How can this vulnerability impact me? :

The vulnerability can allow an attacker to run arbitrary code on your system without any user interaction or privileges, potentially leading to full compromise of confidentiality, integrity, and availability of your system and data.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart