CVE-2026-28500

NameCVE-2026-28500
DescriptionOpen Neural Network Exchange (ONNX) is an open standard for machine learning interoperability. In versions up to and including 1.20.1, a security control bypass exists in onnx.hub.load() due to improper logic in the repository trust verification mechanism. While the function is designed to warn users when loading models from non-official sources, the use of the silent=True parameter completely suppresses all security warnings and confirmation prompts. This vulnerability transforms a standard model-loading function into a vector for Zero-Interaction Supply-Chain Attacks. When chained with file-system vulnerabilities, an attacker can silently exfiltrate sensitive files (SSH keys, cloud credentials) from the victim's machine the moment the model is loaded. As of time of publication, no known patched versions are available.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1131209

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
onnx (PTS)bullseye1.7.0+dfsg-3vulnerable
bookworm1.12.0-2vulnerable
trixie1.17.0-3vulnerable
forky, sid1.20.0-4vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
onnxsource(unstable)(unfixed)1131209

Notes

[trixie] - onnx <no-dsa> (Minor issue)
[bookworm] - onnx <no-dsa> (Minor issue)
https://github.com/onnx/onnx/security/advisories/GHSA-hqmj-h5c6-369m

Search for package or bug name: Reporting problems