Home

Description

The Adversarial Robustness Toolbox (ART) thru 1.20.1 contains a remote code execution vulnerability in its Kubeflow component. The robustness evaluation function for PyTorch models uses the unsafe eval() function to dynamically evaluate user-supplied strings for the LossFn and Optimizer parameters without any sanitization or security restrictions. An attacker can exploit this by providing a specially crafted string that contains arbitrary Python code, which will be executed when eval() is called, leading to complete compromise of the system running the ART evaluation.

PUBLISHED Reserved 2026-03-09 | Published 2026-05-12 | Updated 2026-05-13 | Assigner mitre

References

github.com/Trusted-AI/adversarial-robustness-toolbox

www.notion.so/...2026-31228-35d1e1393188817f9ab0dc4b1651dfe9

cve.org (CVE-2026-31228)

nvd.nist.gov (CVE-2026-31228)

Download JSON