Keras is vulnerable to Deserialization of Untrusted Data
High severity
GitHub Reviewed
Published
Sep 19, 2025
to the GitHub Advisory Database
•
Updated Sep 23, 2025
Description
Published by the National Vulnerability Database
Sep 19, 2025
Published to the GitHub Advisory Database
Sep 19, 2025
Reviewed
Sep 19, 2025
Last updated
Sep 23, 2025
Arbitrary Code Execution in Keras
Keras versions prior to 3.11.0 allow for arbitrary code execution when loading a crafted
.kerasmodel archive, even whensafe_mode=True.The issue arises because the archive’s
config.jsonis parsed before layer deserialization. This can invokekeras.config.enable_unsafe_deserialization(), effectively disabling safe mode from within the loading process itself. An attacker can place this call first in the archive and then include aLambdalayer whose function is deserialized from a pickle, leading to the execution of attacker-controlled Python code as soon as a victim loads the model file.Exploitation requires a user to open an untrusted model; no additional privileges are needed. The fix in version 3.11.0 enforces safe-mode semantics before reading any user-controlled configuration and prevents the toggling of unsafe deserialization via the config file.
Affected versions: < 3.11.0
Patched version: 3.11.0
It is recommended to upgrade to version 3.11.0 or later and to avoid opening untrusted model files.
References