Description
Open Neural Network Exchange (ONNX) is an open standard for machine learning interoperability. Prior to version 1.21.0, there is an issue in onnx.load, the code checks for symlinks to prevent path traversal, but completely misses hardlinks because a hardlink looks exactly like a regular file on the filesystem. This issue has been patched in version 1.21.0.
Published: 2026-04-01
Score: 4.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary File Read
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in the onnx.load function of the ONNX library. The implementation checks for symbolic links to prevent path traversal but fails to detect hardlinks, which are indistinguishable from regular files on a file system. This omission allows an attacker to create a hardlink that points to a sensitive file; when the ONNX loader processes a crafted model, it will inadvertently read the contents of the linked file. The result is the disclosure of any file on the host that the application process has read permissions for, exposing confidential information but not directly executing code.

Affected Systems

All installations of the ONNX library older than version 1.21.0 are affected. The issue exists in the open‑source onnx:onnx project, which is used by a variety of machine‑learning applications. No specific third‑party vendors beyond the core ONNX repository are listed, but any system that incorporates the vulnerable ONNX code base is at risk.

Risk and Exploitability

The CVSS score of 4.7 indicates a moderate severity, while the EPSS score of less than 1% suggests low exploitation probability. The vulnerability is not currently listed in CISA’s KEV catalog. The attack is likely local or requires an attacker to supply a malicious ONNX file to the application; no remote execution pathway is documented. Because it only provides file read capability, the confidentiality impact is significant but the risk of further compromise is limited unless the attacker has additional privileges or the application processes the leaked data elsewhere.

Generated by OpenCVE AI on April 3, 2026 at 03:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update ONNX to version 1.21.0 or later.

Generated by OpenCVE AI on April 3, 2026 at 03:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-cmw6-hcpp-c6jp ONNX: Arbitrary File Read via ExternalData Hardlink Bypass in ONNX load
History

Wed, 15 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Linuxfoundation
Linuxfoundation onnx
CPEs cpe:2.3:a:linuxfoundation:onnx:*:*:*:*:*:*:*:*
Vendors & Products Linuxfoundation
Linuxfoundation onnx

Fri, 03 Apr 2026 01:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-41
References
Metrics threat_severity

None

threat_severity

Moderate


Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Onnx
Onnx onnx
Vendors & Products Onnx
Onnx onnx

Thu, 02 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Open Neural Network Exchange (ONNX) is an open standard for machine learning interoperability. Prior to version 1.21.0, there is an issue in onnx.load, the code checks for symlinks to prevent path traversal, but completely misses hardlinks because a hardlink looks exactly like a regular file on the filesystem. This issue has been patched in version 1.21.0.
Title ONNX: Arbitrary File Read via ExternalData Hardlink Bypass in ONNX load
Weaknesses CWE-22
CWE-61
References
Metrics cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-02T14:10:36.637Z

Reserved: 2026-03-27T18:18:14.894Z

Link: CVE-2026-34446

cve-icon Vulnrichment

Updated: 2026-04-02T14:10:33.155Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-01T18:16:30.660

Modified: 2026-04-15T15:03:15.127

Link: CVE-2026-34446

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-01T17:37:54Z

Links: CVE-2026-34446 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T09:19:05Z

Weaknesses