Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-4f3f-g24h-fr8m | Keras has an untrusted deserialization vulnerability |
Tue, 14 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Keras
Keras keras |
|
| Vendors & Products |
Keras
Keras keras |
Tue, 14 Apr 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Mon, 13 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 13 Apr 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in the `TFSMLayer` class of the `keras` package, version 3.13.0, allows attacker-controlled TensorFlow SavedModels to be loaded during deserialization of `.keras` models, even when `safe_mode=True`. This bypasses the security guarantees of `safe_mode` and enables arbitrary attacker-controlled code execution during model inference under the victim's privileges. The issue arises due to the unconditional loading of external SavedModels, serialization of attacker-controlled file paths, and the lack of validation in the `from_config()` method. | |
| Title | Safe Mode Bypass in keras-team/keras | |
| Weaknesses | CWE-502 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2026-04-13T18:53:12.291Z
Reserved: 2026-01-27T04:14:51.848Z
Link: CVE-2026-1462
Updated: 2026-04-13T18:53:07.966Z
Status : Awaiting Analysis
Published: 2026-04-13T15:17:18.967
Modified: 2026-04-17T15:34:21.867
Link: CVE-2026-1462
OpenCVE Enrichment
Updated: 2026-04-14T16:34:15Z
Github GHSA