Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 13 May 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Remote Code Execution via Unsanitized eval in ART Kubeflow Component |
Wed, 13 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Wed, 13 May 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Trusted-ai
Trusted-ai adversarial-robustness-toolbox |
|
| Vendors & Products |
Trusted-ai
Trusted-ai adversarial-robustness-toolbox |
Tue, 12 May 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Remote Code Execution via Unsanitized eval in ART Kubeflow Component | |
| Weaknesses | CWE-94 |
Tue, 12 May 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Adversarial Robustness Toolbox (ART) thru 1.20.1 contains a remote code execution vulnerability in its Kubeflow component. The robustness evaluation function for PyTorch models uses the unsafe eval() function to dynamically evaluate user-supplied strings for the LossFn and Optimizer parameters without any sanitization or security restrictions. An attacker can exploit this by providing a specially crafted string that contains arbitrary Python code, which will be executed when eval() is called, leading to complete compromise of the system running the ART evaluation. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-13T14:10:16.244Z
Reserved: 2026-03-09T00:00:00.000Z
Link: CVE-2026-31228
Updated: 2026-05-13T14:10:06.119Z
Status : Awaiting Analysis
Published: 2026-05-12T16:16:14.633
Modified: 2026-05-13T15:52:25.637
Link: CVE-2026-31228
No data.
OpenCVE Enrichment
Updated: 2026-05-13T18:30:46Z