A safe mode bypass vulnerability in the `Model.load_model` method in Keras versions 3.0.0 through 3.10.0 allows an attacker to achieve arbitrary code execution by convincing a user to load a specially crafted `.keras` model archive.
History

Thu, 14 Aug 2025 16:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:keras:keras:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Tue, 12 Aug 2025 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Keras
Keras keras
Vendors & Products Keras
Keras keras

Mon, 11 Aug 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 11 Aug 2025 07:30:00 +0000

Type Values Removed Values Added
Description A safe mode bypass vulnerability in the `Model.load_model` method in Keras versions 3.0.0 through 3.10.0 allows an attacker to achieve arbitrary code execution by convincing a user to load a specially crafted `.keras` model archive.
Title Keras safe_mode bypass allows arbitrary code execution when loading a malicious model.
Weaknesses CWE-502
References
Metrics cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/AU:Y/R:A'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Google

Published: 2025-08-11T07:21:16.619Z

Updated: 2025-08-15T03:55:47.720Z

Reserved: 2025-08-08T09:37:17.811Z

Link: CVE-2025-8747

cve-icon Vulnrichment

Updated: 2025-08-11T13:31:40.386Z

cve-icon NVD

Status : Analyzed

Published: 2025-08-11T08:15:26.507

Modified: 2025-08-14T16:24:41.287

Link: CVE-2025-8747

cve-icon Redhat

No data.