CVE-2022-29216
Python vulnerability analysis and mitigation

Overview

TensorFlow's saved_model_cli tool was found to be vulnerable to code injection (CVE-2022-29216) prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4. The vulnerability was discovered and reported by Andey Robins from the Cybersecurity Education and Research Lab at the University of Wyoming (GitHub Advisory).

Technical details

The vulnerability existed in the saved_model_cli tool where unsafe execution was allowed under certain code paths using eval(). This was a result of an incomplete fix for a previous vulnerability (CVE-2021-41228). The issue was present in the preprocess_input_exprs_arg_string function where the safe=False parameter would bypass security checks and directly evaluate expressions using Python's eval() function. The code path was originally maintained for compatibility with test cases using numpy expressions (GitHub Advisory).

Impact

An attacker could exploit this vulnerability to execute arbitrary code through the saved_model_cli tool. This could be leveraged to open a reverse shell or execute other malicious code. However, the impact was considered moderate since the tool is typically run manually and requires direct access (GitHub Advisory).

Mitigation and workarounds

The issue was patched by removing the safe=False argument, ensuring all parsing is done without calling eval(). The fix was implemented in TensorFlow versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4. Users should upgrade to these patched versions to mitigate the vulnerability. The fix was committed in GitHub commit c5da7af048611aa29e9382371f0aed5018516cac (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-66423HIGH7.1
  • PythonPython
  • tryton-server
NoYesNov 30, 2025
CVE-2025-66454MEDIUM6.5
  • PythonPython
  • arcade-mcp-server
NoYesDec 02, 2025
CVE-2025-66424MEDIUM6.5
  • PythonPython
  • trytond
NoYesNov 30, 2025
CVE-2025-66422MEDIUM4.3
  • PythonPython
  • tryton-server
NoYesNov 30, 2025
CVE-2025-65858LOW3.5
  • PythonPython
  • calibreweb
NoNoDec 02, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management