CVE-2026-34447: ONNX: symlink traversal reads host files via model loading
GHSA-p433-9wv8-28xj MEDIUM CISA: TRACK*Any pipeline or system loading untrusted ONNX model files is at risk of having sensitive host files read by a crafted model with symlinked external data — including secrets, SSH keys, or credentials accessible to the loading process. The attack surface is broad: CI/CD model validation pipelines, inference servers, and data scientists pulling models from public registries are all exposed. Patch to ONNX >= 1.21.0 immediately, and audit any workflow that loads ONNX models from external or untrusted sources.
What is the risk?
Medium severity on paper, but contextually higher in AI/ML environments. The CVSS 'local' vector is misleading: in ML pipelines, 'loading a model file' is routine and often automated — the attacker just needs to get a malicious ONNX file into the pipeline, which is trivial via public model hubs. No privileges required and the confidentiality impact is HIGH (full arbitrary file read as the process owner). In production environments, the inference service process may have access to API keys, database credentials, or internal certificates, making this a serious lateral movement enabler despite the medium score.
What systems are affected?
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| onnx | pip | < 1.21.0 | 1.21.0 |
Do you use onnx? You're affected.
Severity & Risk
Attack Surface
What should I do?
6 steps-
PATCH
Upgrade onnx to >= 1.21.0 immediately. Run
pip install --upgrade onnxand validate withpip show onnx. -
DETECT
Scan existing ONNX model files in your artifact stores for symlinks —
find <model_dir> -type lbefore loading any model. -
SANDBOX
Run model loading in isolated containers with restricted filesystem mounts (no access to /etc, /home, secrets volumes).
-
SUPPLY CHAIN
Verify ONNX model file provenance via checksums/signatures before loading in any pipeline.
-
MONITOR
Alert on unexpected file access patterns from ML inference processes (e.g., reads to /etc/passwd, ~/.ssh, credential directories).
-
WORKAROUND (pre-patch): Pre-scan model external data files for symlinks before loading; reject any model that contains symlinked external data references.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2026-34447?
Any pipeline or system loading untrusted ONNX model files is at risk of having sensitive host files read by a crafted model with symlinked external data — including secrets, SSH keys, or credentials accessible to the loading process. The attack surface is broad: CI/CD model validation pipelines, inference servers, and data scientists pulling models from public registries are all exposed. Patch to ONNX >= 1.21.0 immediately, and audit any workflow that loads ONNX models from external or untrusted sources.
Is CVE-2026-34447 actively exploited?
No confirmed active exploitation of CVE-2026-34447 has been reported, but organizations should still patch proactively.
How to fix CVE-2026-34447?
1. PATCH: Upgrade onnx to >= 1.21.0 immediately. Run `pip install --upgrade onnx` and validate with `pip show onnx`. 2. DETECT: Scan existing ONNX model files in your artifact stores for symlinks — `find <model_dir> -type l` before loading any model. 3. SANDBOX: Run model loading in isolated containers with restricted filesystem mounts (no access to /etc, /home, secrets volumes). 4. SUPPLY CHAIN: Verify ONNX model file provenance via checksums/signatures before loading in any pipeline. 5. MONITOR: Alert on unexpected file access patterns from ML inference processes (e.g., reads to /etc/passwd, ~/.ssh, credential directories). 6. WORKAROUND (pre-patch): Pre-scan model external data files for symlinks before loading; reject any model that contains symlinked external data references.
What systems are affected by CVE-2026-34447?
This vulnerability affects the following AI/ML architecture patterns: model serving, training pipelines, MLOps CI/CD pipelines, model registries, edge deployments.
What is the CVSS score for CVE-2026-34447?
CVE-2026-34447 has a CVSS v3.1 base score of 5.5 (MEDIUM). The EPSS exploitation probability is 0.02%.
Technical Details
NVD Description
Open Neural Network Exchange (ONNX) is an open standard for machine learning interoperability. Prior to version 1.21.0, there is a symlink traversal vulnerability in external data loading allows reading files outside the model directory. This issue has been patched in version 1.21.0.
Exploitation Scenario
An adversary publishes a seemingly legitimate ONNX model to a public hub (Hugging Face, ONNX Model Zoo mirror, or internal registry). The model contains a large external data file declared in the ONNX protobuf, but the actual file on disk is a symlink pointing to /etc/passwd, ~/.aws/credentials, or a Kubernetes service account token at /var/run/secrets/kubernetes.io/serviceaccount/token. A CI/CD pipeline pulling and validating the model, or a data scientist running `onnx.checker.check_model('model.onnx')`, triggers the external data load. The process reads the symlink target and — depending on the application — logs it, stores it, or returns it in an API response. Combined with a second-stage exfiltration channel, the attacker retrieves cloud credentials and pivots to the production environment.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N References
Timeline
Related Vulnerabilities
CVE-2026-28500 9.1 onnx: Integrity Verification bypass enables tampering
Same package: onnx CVE-2024-5187 8.8 ONNX: path traversal in model download enables RCE
Same package: onnx CVE-2026-34445 8.6 ONNX: property overwrite via crafted model file
Same package: onnx CVE-2024-7776 8.1 ONNX: path traversal in download_model enables RCE
Same package: onnx GHSA-q56x-g2fj-4rj6 7.1 onnx: TOCTOU symlink following enables arbitrary file write
Same package: onnx