Source: onnx
Version: 1.20.0-4
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for onnx.

CVE-2026-28500[0]:
| Open Neural Network Exchange (ONNX) is an open standard for machine
| learning interoperability. In versions up to and including 1.20.1, a
| security control bypass exists in onnx.hub.load() due to improper
| logic in the repository trust verification mechanism. While the
| function is designed to warn users when loading models from non-
| official sources, the use of the silent=True parameter completely
| suppresses all security warnings and confirmation prompts. This
| vulnerability transforms a standard model-loading function into a
| vector for Zero-Interaction Supply-Chain Attacks. When chained with
| file-system vulnerabilities, an attacker can silently exfiltrate
| sensitive files (SSH keys, cloud credentials) from the victim's
| machine the moment the model is loaded. As of time of publication,
| no known patched versions are available.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-28500
    https://www.cve.org/CVERecord?id=CVE-2026-28500
[1] https://github.com/onnx/onnx/security/advisories/GHSA-hqmj-h5c6-369m

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to