Keras

6 CVEs product

Monthly

CVE-2026-1669 HIGH PATCH This Week

Keras versions 3.0.0 through 3.13.1 are vulnerable to arbitrary file read through malicious .keras model files that abuse HDF5 external dataset references, enabling unauthenticated remote attackers to disclose sensitive local files. This high-severity vulnerability affects all supported platforms and currently has no available patch. An attacker can exploit this by crafting a specially formatted model file that, when loaded by a Keras application, reads arbitrary files from the system.

Information Disclosure AI / ML Keras Redhat
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-0897 HIGH PATCH This Week

Keras versions up to 3.13.0 is affected by allocation of resources without limits or throttling (CVSS 7.5).

Google Python Denial Of Service AI / ML Keras +1
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2025-9906 HIGH PATCH This Month

The Keras Model.load_model method can be exploited to achieve arbitrary code execution, even with safe_mode=True. Rated high severity (CVSS 8.6), this vulnerability is low attack complexity. No vendor patch available.

Python RCE Deserialization Keras Redhat
NVD GitHub
CVSS 4.0
8.6
EPSS
0.1%
CVE-2025-9905 HIGH POC PATCH This Month

The Keras Model.load_model method can be exploited to achieve arbitrary code execution, even with safe_mode=True. Rated high severity (CVSS 7.3). Public exploit code available.

Python RCE Keras Redhat
NVD GitHub
CVSS 4.0
7.3
EPSS
0.0%
CVE-2025-8747 HIGH PATCH This Month

A safe mode bypass vulnerability in the `Model.load_model` method in Keras versions 3.0.0 through 3.10.0 allows an attacker to achieve arbitrary code execution by convincing a user to load a. Rated high severity (CVSS 8.6), this vulnerability is low attack complexity. No vendor patch available.

RCE Deserialization Keras
NVD GitHub
CVSS 4.0
8.6
EPSS
0.0%
CVE-2024-55459 MEDIUM This Month

An issue in keras 3.7.0 allows attackers to write arbitrary files to the user's machine via downloading a crafted tar file through the get_file function. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Information Disclosure Keras Redhat
NVD GitHub
CVSS 3.1
6.5
EPSS
0.1%
CVE-2026-1669
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Keras versions 3.0.0 through 3.13.1 are vulnerable to arbitrary file read through malicious .keras model files that abuse HDF5 external dataset references, enabling unauthenticated remote attackers to disclose sensitive local files. This high-severity vulnerability affects all supported platforms and currently has no available patch. An attacker can exploit this by crafting a specially formatted model file that, when loaded by a Keras application, reads arbitrary files from the system.

Information Disclosure AI / ML Keras +1
NVD GitHub
CVE-2026-0897
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Keras versions up to 3.13.0 is affected by allocation of resources without limits or throttling (CVSS 7.5).

Google Python Denial Of Service +3
NVD GitHub
CVE-2025-9906
EPSS 0% CVSS 8.6
HIGH PATCH This Month

The Keras Model.load_model method can be exploited to achieve arbitrary code execution, even with safe_mode=True. Rated high severity (CVSS 8.6), this vulnerability is low attack complexity. No vendor patch available.

Python RCE Deserialization +2
NVD GitHub
CVE-2025-9905
EPSS 0% CVSS 7.3
HIGH POC PATCH This Month

The Keras Model.load_model method can be exploited to achieve arbitrary code execution, even with safe_mode=True. Rated high severity (CVSS 7.3). Public exploit code available.

Python RCE Keras +1
NVD GitHub
CVE-2025-8747
EPSS 0% CVSS 8.6
HIGH PATCH This Month

A safe mode bypass vulnerability in the `Model.load_model` method in Keras versions 3.0.0 through 3.10.0 allows an attacker to achieve arbitrary code execution by convincing a user to load a. Rated high severity (CVSS 8.6), this vulnerability is low attack complexity. No vendor patch available.

RCE Deserialization Keras
NVD GitHub
CVE-2024-55459
EPSS 0% CVSS 6.5
MEDIUM This Month

An issue in keras 3.7.0 allows attackers to write arbitrary files to the user's machine via downloading a crafted tar file through the get_file function. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Information Disclosure Keras Redhat
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy