-
CVSS Score
-The vulnerability stems from two key issues: 1) The _retrieve_class_or_fn function in serialization_lib.py allowed loading any Python module (not just keras.src modules), enabling code injection. 2) The process_layer function in functional.py lacked type checking of deserialized objects. The patch added module whitelisting to _retrieve_class_or_fn and Operation type checking to process_layer, confirming these were the vulnerable points. The CWE-94 classification and commit diff analysis directly implicate these deserialization pathways as the attack surface.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| keras | pip | >= 3.0.0, < 3.9.0 | 3.9.0 |