Multiple vulnerabilities have been discovered in ONNX, a popular open-source machine learning model format. These vulnerabilities could allow attackers to cause denial-of-service (DoS), arbitrary file read/write, and object corruption. Users of ONNX are advised to upgrade to version 1.21.0 to mitigate these risks.
These vulnerabilities range from medium to high severity, potentially causing significant impact.
What is Onnx?
CVE-2026-34445: ONNX ExternalDataInfo Object Corruption and DoS
High severity: can disrupt service or corrupt objects.
EPSS score of 0.04 indicates a low probability of exploitation.
The ExternalDataInfo class in ONNX uses Python's `setattr()` to load metadata from ONNX model files without proper validation. A malicious ONNX model can exploit this by overwriting internal object properties, leading to denial-of-service or object corruption.
How to fix CVE-2026-34445 in Onnx
Patch immediately- 1.Upgrade the onnx package to version 1.21.0 or later.
pip install --upgrade onnxWorkaround: There is no known workaround besides upgrading.
NextGuard automatically flags CVE-2026-34445 if Onnx appears in any of your monitored projects — no manual lookup required.
CVE-2026-34447: ONNX External Data Symlink Traversal
Medium severity: allows unauthorized file access.
EPSS score of 0.012 indicates a very low probability of exploitation.
A symlink traversal vulnerability exists in ONNX's external data loading mechanism. By crafting a malicious ONNX model with a symlink in the external data path, an attacker can read arbitrary files outside the intended model directory.
How to fix CVE-2026-34447 in Onnx
Patch immediately- 1.Upgrade the onnx package to version 1.21.0 or later.
pip install --upgrade onnxWorkaround: Avoid loading ONNX models from untrusted sources.
NextGuard automatically flags CVE-2026-34447 if Onnx appears in any of your monitored projects — no manual lookup required.
GHSA-q56x-g2fj-4rj6: ONNX TOCTOU Arbitrary File Read/Write
High severity: can overwrite arbitrary files.
No EPSS score available.
The `save_external_data` method in ONNX is vulnerable to a Time-of-Check Time-of-Use (TOCTOU) vulnerability, allowing arbitrary file read/write. An attacker can exploit this by replacing an external data file with a symlink, leading to the overwriting of sensitive files.
How to fix GHSA-q56x-g2fj-4rj6 in Onnx
Patch immediately- 1.Upgrade the onnx package to version 1.21.0 or later.
pip install --upgrade onnxWorkaround: Avoid saving ONNX models with external data to untrusted locations.
NextGuard automatically flags GHSA-q56x-g2fj-4rj6 if Onnx appears in any of your monitored projects — no manual lookup required.
Stay ahead of python vulnerabilities
Proactively detect and remediate vulnerabilities in your python projects. Use NextGuard to monitor your python dependencies and receive alerts on new threats.
Compare PlansFrequently asked questions
Multiple vulnerabilities in ONNX require immediate attention and patching. Upgrade to version 1.21.0 to mitigate the risks of DoS, arbitrary file access, and object corruption. see all python vulnerabilities.
Related topics