| Summary | The Adversarial Robustness Toolbox (ART) thru 1.20.1 contains a remote code execution vulnerability in its Kubeflow component. The robustness evaluation function for PyTorch models uses the unsafe eval() function to dynamically evaluate user-supplied strings for the LossFn and Optimizer parameters without any sanitization or security restrictions. An attacker can exploit this by providing a specially crafted string that contains arbitrary Python code, which will be executed when eval() is called, leading to complete compromise of the system running the ART evaluation. |
|---|---|
| Publication Date | May 13, 2026, 1:16 a.m. |
| Registration Date | May 13, 2026, 4:12 a.m. |
| Last Update | May 13, 2026, 1:16 a.m. |