Home

Description

A safe mode bypass vulnerability in the `Model.load_model` method in Keras versions 3.0.0 through 3.10.0 allows an attacker to achieve arbitrary code execution by convincing a user to load a specially crafted `.keras` model archive.

PUBLISHED Reserved 2025-08-08 | Published 2025-08-11 | Updated 2025-08-15 | Assigner Google




HIGH: 8.6CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/AU:Y/R:A

Problem types

CWE-502 Deserialization of Untrusted Data

Product status

Default status
unaffected

3.0.0
affected

Credits

JFrog Security Research Team reporter

References

github.com/keras-team/keras/pull/21429 patch

jfrog.com/blog/keras-safe_mode-bypass-vulnerability/ third-party-advisory

cve.org (CVE-2025-8747)

nvd.nist.gov (CVE-2025-8747)

Download JSON