๐Ÿ” CVE Alert

CVE-2026-1462

HIGH 8.8

Safe Mode Bypass in keras-team/keras

CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
0th

A vulnerability in the `TFSMLayer` class of the `keras` package, version 3.13.0, allows attacker-controlled TensorFlow SavedModels to be loaded during deserialization of `.keras` models, even when `safe_mode=True`. This bypasses the security guarantees of `safe_mode` and enables arbitrary attacker-controlled code execution during model inference under the victim's privileges. The issue arises due to the unconditional loading of external SavedModels, serialization of attacker-controlled file paths, and the lack of validation in the `from_config()` method.

CWE CWE-502
Vendor keras-team
Product keras-team/keras
Published Apr 13, 2026
Last Updated Apr 13, 2026
Stay Ahead of the Next One

Get instant alerts for keras-team keras-team/keras

Be the first to know when new high vulnerabilities affecting keras-team keras-team/keras are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Affected Versions

keras-team / keras-team/keras
unspecified < 3.13.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
huntr.com: https://huntr.com/bounties/7e78d6f1-6977-4300-b595-e81bdbda331c github.com: https://github.com/keras-team/keras/commit/b6773d3decaef1b05d8e794458e148cb362f163f