CVE-2026-1462: Vulnerability Analysis

Analysis of CVE-2026-1462 vulnerability with CVSS score 8.8.

CVE Analysis

5 min read

ZeroPath Security Research
ZeroPath Security Research

2026-04-13

CVE-2026-1462: Vulnerability Analysis
Experimental AI-Generated Content

This CVE analysis is an experimental publication that is completely AI-generated. The content may contain errors or inaccuracies and is subject to change as more information becomes available. We are continuously refining our process.

If you have feedback, questions, or notice any errors, please reach out to us.

[email protected]

CVE-2026-1462: Vulnerability Analysis

Executive Summary

Unable to generate a complete analysis due to an error.

Technical Specifications

  • CVE ID: CVE-2026-1462
  • Vendors: Unknown
  • Date Reported: 2026-04-13T15:17:18.967
  • CVSS Score: 8.8
  • Description: A vulnerability in the TFSMLayer class of the keras package, version 3.13.0, allows attacker-controlled TensorFlow SavedModels to be loaded during deserialization of .keras models, even when safe_mode=True. This bypasses the security guarantees of safe_mode and enables arbitrary attacker-controlled code execution during model inference under the victim's privileges. The issue arises due to the unconditional loading of external SavedModels, serialization of attacker-controlled file paths, and the lack of validation in the from_config() method.
  • CWE IDs: CWE-502

References

Detect & fix
what others miss

Security magnifying glass visualization