Vulnerability Description
The Adversarial Robustness Toolbox (ART) thru 1.20.1 contains a remote code execution vulnerability in its Kubeflow component. The robustness evaluation function for PyTorch models uses the unsafe eval() function to dynamically evaluate user-supplied strings for the LossFn and Optimizer parameters without any sanitization or security restrictions. An attacker can exploit this by providing a specially crafted string that contains arbitrary Python code, which will be executed when eval() is called, leading to complete compromise of the system running the ART evaluation.
CVSS Score
CRITICAL
Related Weaknesses (CWE)
References
- https://github.com/Trusted-AI/adversarial-robustness-toolbox
- https://www.notion.so/CVE-2026-31228-35d1e1393188817f9ab0dc4b1651dfe9
FAQ
What is CVE-2026-31228?
CVE-2026-31228 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The Adversarial Robustness Toolbox (ART) thru 1.20.1 contains a remote code execution vulnerability in its Kubeflow component. The robustness evaluation function for PyTorch models uses the unsafe eva...
How severe is CVE-2026-31228?
CVE-2026-31228 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-31228?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.