Multiple critical vulnerabilities have been identified in ONNX, a framework for representing machine learning models. These vulnerabilities can lead to silent supply chain attacks, arbitrary file reads, and denial-of-service conditions, impacting Python applications that utilize ONNX models. Patches are available and should be applied immediately.
The CVSS scores range from 4.7 to 8.6, indicating significant vulnerabilities that could lead to serious consequences if exploited.
What is Onnx?
Silent Supply Chain Attack via `onnx.hub.load()`
High severity due to potential for arbitrary code execution and silent compromise.
A low (0.01%) probability of exploitation, but the impact is severe.
Passing `silent=True` to `onnx.hub.load()` suppresses all trust warnings and user prompts when loading models from external repositories. This allows attackers to silently inject malicious models into pipelines without user awareness, potentially leading to arbitrary code execution.
How to fix CVE-2026-28500 in Onnx
Patch immediately- 1.Update ONNX to the latest version (1.21.0 or higher).
pip install --upgrade onnxVerify with:
pip show onnxWorkaround: Avoid using `silent=True` with `onnx.hub.load()` to ensure user awareness and validation of model sources.
NextGuard automatically flags CVE-2026-28500 if [Onnx] appears in any of your monitored projects — no manual lookup required.
Path Traversal Vulnerability via Symlink
High severity due to potential for arbitrary file read.
A moderate (0.063%) probability of exploitation.
A path traversal vulnerability exists due to insufficient symlink validation. Attackers can leverage symlinks to read arbitrary files outside the model or user-provided directory, potentially exposing sensitive data.
How to fix CVE-2026-27489 in Onnx
Patch within 24h- 1.Update ONNX to version 1.21.0 or higher.
pip install --upgrade onnxVerify with:
pip show onnxWorkaround: Carefully validate model sources and restrict access to sensitive files.
NextGuard automatically flags CVE-2026-27489 if [Onnx] appears in any of your monitored projects — no manual lookup required.
Denial-of-Service via Object Settings Manipulation
High severity due to potential for denial-of-service.
A low (0.04%) probability of exploitation.
Malicious ONNX models can crash servers by exploiting unprotected object settings within the ExternalDataInfo class. Attackers can manipulate properties like 'length' to trigger out-of-memory errors or inject 'dunder' attributes to corrupt objects.
How to fix CVE-2026-34445 in Onnx
Patch immediately- 1.Update ONNX to version 1.21.0 or higher.
pip install --upgrade onnxVerify with:
pip show onnxWorkaround: Implement strict input validation and sanitization for ONNX models.
NextGuard automatically flags CVE-2026-34445 if [Onnx] appears in any of your monitored projects — no manual lookup required.
Arbitrary File Read via External Data Hardlink Bypass
Medium severity due to potential for arbitrary file read.
A low (0.012%) probability of exploitation.
ONNX is vulnerable to arbitrary file reads due to a hardlink bypass in the external data loading mechanism. Attackers can create hardlinks to sensitive files and exploit this to read arbitrary files on the system.
How to fix CVE-2026-34446 in Onnx
Patch within 7 days- 1.Update ONNX to version 1.21.0 or higher.
pip install --upgrade onnxVerify with:
pip show onnxWorkaround: Restrict access to external data directories and validate file paths.
NextGuard automatically flags CVE-2026-34446 if [Onnx] appears in any of your monitored projects — no manual lookup required.
External Data Symlink Traversal
Medium severity due to potential for arbitrary file read.
A low (0.012%) probability of exploitation.
The external data loading process fails to properly handle symlinks, allowing attackers to read files outside the intended model directory. This vulnerability stems from a lack of robust symlink checks during file validation.
How to fix CVE-2026-34447 in Onnx
Patch within 7 days- 1.Update ONNX to version 1.21.0 or higher.
pip install --upgrade onnxVerify with:
pip show onnxWorkaround: Implement stricter file path validation and symlink checks during external data loading.
NextGuard automatically flags CVE-2026-34447 if [Onnx] appears in any of your monitored projects — no manual lookup required.
Stay ahead of Python vulnerabilities
Proactively identify and address security risks in your Python projects with automated dependency scanning. Monitor your python dependencies to ensure you're always protected against the latest threats.
Compare your dependenciesFrequently asked questions
These ONNX vulnerabilities highlight the importance of maintaining up-to-date dependencies and implementing robust security practices in your machine learning pipelines. Ensure your environment is secure by patching immediately. See all python vulnerabilities.
Related topics