Linuxfoundation Onnx vulnerabilities
7 known vulnerabilities affecting linuxfoundation/onnx.
Total CVEs
7
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL2HIGH5
Vulnerabilities
Page 1 of 1
CVE-2026-27489HIGHCVSS 8.7fixed in 1.21.02026-04-01
CVE-2026-27489 [HIGH] CWE-23 CVE-2026-27489: Open Neural Network Exchange (ONNX) is an open standard for machine learning interoperability. Prior
Open Neural Network Exchange (ONNX) is an open standard for machine learning interoperability. Prior to version 1.21.0, a path traversal vulnerability via symlink allows to read arbitrary files outside model or user-provided directory. This issue has been patched in version 1.21.0.
nvd
CVE-2026-28500CRITICALCVSS 9.1≤ 1.20.12026-03-18
CVE-2026-28500 [CRITICAL] CWE-345 CVE-2026-28500: Open Neural Network Exchange (ONNX) is an open standard for machine learning interoperability. In ve
Open Neural Network Exchange (ONNX) is an open standard for machine learning interoperability. In versions up to and including 1.20.1, a security control bypass exists in onnx.hub.load() due to improper logic in the repository trust verification mechanism. While the function is designed to warn users when loading models from non-official sources,
nvd
CVE-2025-51480HIGHCVSS 8.8v1.17.02025-07-22
CVE-2025-51480 [HIGH] CWE-22 CVE-2025-51480: Path Traversal vulnerability in onnx.external_data_helper.save_external_data in ONNX 1.17.0 allows a
Path Traversal vulnerability in onnx.external_data_helper.save_external_data in ONNX 1.17.0 allows attackers to overwrite arbitrary files by supplying crafted external_data.location paths containing traversal sequences, bypassing intended directory restrictions.
nvd
CVE-2024-5187HIGHCVSS 8.8v1.16.02024-06-06
CVE-2024-5187 [HIGH] CWE-22 CVE-2024-5187: A vulnerability in the `download_model_with_test_data` function of the onnx/onnx framework, version
A vulnerability in the `download_model_with_test_data` function of the onnx/onnx framework, version 1.16.0, allows for arbitrary file overwrite due to inadequate prevention of path traversal attacks in malicious tar files. This vulnerability enables attackers to overwrite any file on the system, potentially leading to remote code execution, deletion of sy
nvd
CVE-2024-27319CRITICALCVSS 9.1fixed in 1.16.02024-02-23
CVE-2024-27319 [CRITICAL] CWE-125 CVE-2024-27319: Versions of the package onnx before and including 1.15.0 are vulnerable to Out-of-bounds Read as the
Versions of the package onnx before and including 1.15.0 are vulnerable to Out-of-bounds Read as the ONNX_ASSERT and ONNX_ASSERTM functions have an off by one string copy.
nvd
CVE-2024-27318HIGHCVSS 7.5fixed in 1.16.02024-02-23
CVE-2024-27318 [HIGH] CVE-2024-27318: Versions of the package onnx before and including 1.15.0 are vulnerable to Directory Traversal as th
Versions of the package onnx before and including 1.15.0 are vulnerable to Directory Traversal as the external_data field of the tensor proto can have a path to the file which is outside the model current directory or user-provided directory. The vulnerability occurs as a bypass for the patch added for CVE-2022-25882.
nvd
CVE-2022-25882HIGHCVSS 7.5fixed in 1.13.02023-01-26
CVE-2022-25882 [HIGH] CWE-22 CVE-2022-25882: Versions of the package onnx before 1.13.0 are vulnerable to Directory Traversal as the external_dat
Versions of the package onnx before 1.13.0 are vulnerable to Directory Traversal as the external_data field of the tensor proto can have a path to the file which is outside the model current directory or user-provided directory, for example "../../../etc/passwd"
nvd