← Back to CVEs
CVE-2025-49655
CRITICAL9.8
Description
Deserialization of untrusted data can occur in versions of the Keras framework running versions 3.11.0 up to but not including 3.11.3, enabling a maliciously uploaded Keras file containing a TorchModuleWrapper class to run arbitrary code on an end user’s system when loaded despite safe mode being enabled. The vulnerability can be triggered through both local and remote files.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published10/17/2025
Last Modified10/21/2025
Sourcenvd
Honeypot Sightings0
Weaknesses (CWE)
CWE-502
References
https://github.com/keras-team/keras/pull/21575(6f8de1f0-f67e-45a6-b68f-98777fdb759c)
https://hiddenlayer.com/sai_security_advisor/2025-10-keras/(6f8de1f0-f67e-45a6-b68f-98777fdb759c)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.