Description
A vulnerability in the `TFSMLayer` class of the `keras` package, version 3.13.0, allows attacker-controlled TensorFlow SavedModels to be loaded during deserialization of `.keras` models, even when `safe_mode=True`. This bypasses the security guarantees of `safe_mode` and enables arbitrary attacker-controlled code execution during model inference under the victim's privileges. The issue arises due to the unconditional loading of external SavedModels, serialization of attacker-controlled file paths, and the lack of validation in the `from_config()` method.
INFO
Published Date :
2026-04-13T14:55:28.649Z
Last Modified :
2026-04-13T18:53:12.291Z
Source :
@huntr_ai
AFFECTED PRODUCTS
The following products are affected by CVE-2026-1462 vulnerability.
| Vendors | Products |
|---|---|
| Keras |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-1462.