Description
Open Neural Network Exchange (ONNX) is an open standard for machine learning interoperability. Prior to version 1.21.0, the ExternalDataInfo class in ONNX was using Python’s setattr() function to load metadata (like file paths or data lengths) directly from an ONNX model file. It didn’t check if the "keys" in the file were valid. Due to this, an attacker could craft a malicious model that overwrites internal object properties. This issue has been patched in version 1.21.0.
Published: 2026-04-01
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Server crash via malicious ONNX models
Action: Immediate Patch
AI Analysis

Impact

The vulnerability arises from the ExternalDataInfo class in ONNX which, before version 1.21.0, used Python’s setattr() to load metadata from a model file without validating the keys. An attacker can craft a model that overwrites internal object properties, leading to a crash of the runtime or application that loads the model. The weakness maps to input validation failures and resource exhaustion.

Affected Systems

The flaw affects the ONNX library and runtimes that load ONNX model files, specifically any version older than 1.21.0. Systems using ONNX for inference or model serving should verify the ONNX runtime version and refrain from loading untrusted models until patched.

Risk and Exploitability

The CVSS base score of 8.6 indicates a high severity vulnerability. With no EPSS data and absence in the KEV catalog, the likelihood of widespread exploitation remains uncertain, yet the impact would be a denial of service. The likely attack vector is remote, where an adversary supplies a malicious model through an interface that accepts ONNX files. Exploitation requires only the ability to feed a crafted model to the vulnerable process.

Generated by OpenCVE AI on April 2, 2026 at 02:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade ONNX to version 1.21.0 or later.

Generated by OpenCVE AI on April 2, 2026 at 02:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-538c-55jv-c5g9 ONNX: Malicious ONNX models can crash servers by exploiting unprotected object settings.
History

Wed, 15 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Linuxfoundation
Linuxfoundation onnx
CPEs cpe:2.3:a:linuxfoundation:onnx:*:*:*:*:*:*:*:*
Vendors & Products Linuxfoundation
Linuxfoundation onnx

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Onnx
Onnx onnx
Vendors & Products Onnx
Onnx onnx

Thu, 02 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Open Neural Network Exchange (ONNX) is an open standard for machine learning interoperability. Prior to version 1.21.0, the ExternalDataInfo class in ONNX was using Python’s setattr() function to load metadata (like file paths or data lengths) directly from an ONNX model file. It didn’t check if the "keys" in the file were valid. Due to this, an attacker could craft a malicious model that overwrites internal object properties. This issue has been patched in version 1.21.0.
Title ONNX: Malicious ONNX models can crash servers by exploiting unprotected object settings.
Weaknesses CWE-20
CWE-400
CWE-915
References
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-01T18:00:14.120Z

Reserved: 2026-03-27T18:18:14.894Z

Link: CVE-2026-34445

cve-icon Vulnrichment

Updated: 2026-04-01T17:59:33.771Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-01T18:16:30.500

Modified: 2026-04-15T15:08:13.003

Link: CVE-2026-34445

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-01T17:30:19Z

Links: CVE-2026-34445 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:17:05Z

Weaknesses