Description
Open Neural Network Exchange (ONNX) is an open standard for machine learning interoperability. Prior to version 1.21.0, the ExternalDataInfo class in ONNX was using Python’s setattr() function to load metadata (like file paths or data lengths) directly from an ONNX model file. It didn’t check if the "keys" in the file were valid. Due to this, an attacker could craft a malicious model that overwrites internal object properties. This issue has been patched in version 1.21.0.
Published: 2026-04-01
Score: 8.6 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-538c-55jv-c5g9 ONNX: Malicious ONNX models can crash servers by exploiting unprotected object settings.
History

Thu, 02 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Open Neural Network Exchange (ONNX) is an open standard for machine learning interoperability. Prior to version 1.21.0, the ExternalDataInfo class in ONNX was using Python’s setattr() function to load metadata (like file paths or data lengths) directly from an ONNX model file. It didn’t check if the "keys" in the file were valid. Due to this, an attacker could craft a malicious model that overwrites internal object properties. This issue has been patched in version 1.21.0.
Title ONNX: Malicious ONNX models can crash servers by exploiting unprotected object settings.
Weaknesses CWE-20
CWE-400
CWE-915
References
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-01T18:00:14.120Z

Reserved: 2026-03-27T18:18:14.894Z

Link: CVE-2026-34445

cve-icon Vulnrichment

Updated: 2026-04-01T17:59:33.771Z

cve-icon NVD

Status : Received

Published: 2026-04-01T18:16:30.500

Modified: 2026-04-01T18:16:30.500

Link: CVE-2026-34445

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-01T17:30:19Z

Links: CVE-2026-34445 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses