CVE-2025-1550
CRITICAL NUCLEIKeras < 3.8.0 - Code Injection
Title source: ruleDescription
The Keras Model.load_model function permits arbitrary code execution, even with safe_mode=True, through a manually constructed, malicious .keras archive. By altering the config.json file within the archive, an attacker can specify arbitrary Python modules and functions, along with their arguments, to be loaded and executed during model loading.
Exploits (2)
exploitdb
WORKING POC
by Mohammed Idrees Banyamer · pythonremotepython
https://www.exploit-db.com/exploits/52359
Nuclei Templates (1)
Keras Model.load_model - Arbitrary Code Execution
CRITICALby nukunga[seunghyeonJeon]
Scores
CVSS v3
9.8
EPSS
0.0797
EPSS Percentile
92.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-94
Status
published
Products (2)
keras/keras
3.0.0 - 3.8.0
pypi/keras
3.0.0 - 3.9.0PyPI
Published
Mar 11, 2025
Tracked Since
Feb 18, 2026