The Adversarial Robustness Toolbox (ART) thru 1.20.1 contains a command-line argument injection vulnerability in its Kubeflow component (robustness_evaluation_fgsm_pytorch.py). The script uses the unsafe eval() function to parse string values provided via the --clip_values and --input_shape command-line arguments. This allows an attacker to inject arbitrary Python code into these arguments, which will be executed when eval() is called. The vulnerability can be exploited remotely if an attacker can control these arguments (e.g., through pipeline configuration or automated scripts), leading to arbitrary code execution on the system running the ART evaluation.
Metrics
Affected Vendors & Products
References
History
Wed, 13 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-88 | |
| Metrics |
cvssV3_1
|
Wed, 13 May 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Trusted-ai
Trusted-ai adversarial-robustness-toolbox |
|
| Vendors & Products |
Trusted-ai
Trusted-ai adversarial-robustness-toolbox |
Tue, 12 May 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Command‑Line Argument Injection in Adversarial Robustness Toolbox Enables Arbitrary Code Execution | |
| Weaknesses | CWE-20 CWE-94 |
Tue, 12 May 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Adversarial Robustness Toolbox (ART) thru 1.20.1 contains a command-line argument injection vulnerability in its Kubeflow component (robustness_evaluation_fgsm_pytorch.py). The script uses the unsafe eval() function to parse string values provided via the --clip_values and --input_shape command-line arguments. This allows an attacker to inject arbitrary Python code into these arguments, which will be executed when eval() is called. The vulnerability can be exploited remotely if an attacker can control these arguments (e.g., through pipeline configuration or automated scripts), leading to arbitrary code execution on the system running the ART evaluation. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2026-05-12T00:00:00.000Z
Updated: 2026-05-13T14:24:23.334Z
Reserved: 2026-03-09T00:00:00.000Z
Link: CVE-2026-31230
Updated: 2026-05-13T14:24:18.266Z
Status : Deferred
Published: 2026-05-12T18:16:51.277
Modified: 2026-05-13T16:16:39.053
Link: CVE-2026-31230
No data.