Mlflow

12 CVEs product

Monthly

CVE-2025-15031 CRITICAL PATCH Act Now

MLflow, a popular open-source machine learning lifecycle platform, contains a path traversal vulnerability in its pyfunc extraction process that allows arbitrary file writes. The vulnerability stems from unsafe use of tarfile.extractall without proper path validation, enabling attackers to craft malicious tar.gz files with directory traversal sequences or absolute paths to write files outside the intended extraction directory. This poses critical risk in multi-tenant environments and can lead to remote code execution, with a CVSS score of 8.1 and confirmed exploit details available via Huntr.

RCE Path Traversal Redhat Mlflow AI / ML
NVD VulDB
CVSS 3.1
9.1
EPSS
0.0%
CVE-2025-14287 HIGH PATCH This Week

Command injection vulnerability in MLflow versions before v3.7.0 that allows attackers to execute arbitrary commands by injecting malicious input through the --container parameter when deploying models to SageMaker. The vulnerability affects MLflow installations in development environments, CI/CD pipelines, and cloud deployments, with a CVSS score of 7.5 indicating high severity. No active exploitation or KEV listing is reported, and no EPSS data is available to assess real-world exploitation likelihood.

Command Injection RCE Code Injection AI / ML Redhat +1
NVD VulDB
CVSS 3.0
7.5
EPSS
0.1%
CVE-2026-2635 CRITICAL PATCH Act Now

Default password auth bypass in MLflow ML platform. EPSS 1.4%.

Authentication Bypass AI / ML Mlflow
NVD GitHub
CVSS 3.0
9.8
EPSS
1.4%
CVE-2026-2033 HIGH PATCH Act Now

Unauthenticated remote code execution in MLflow Tracking Server through directory traversal in artifact file path handling enables attackers to execute arbitrary commands with service account privileges. The vulnerability stems from insufficient validation of user-supplied paths in file operations, allowing exploitation without authentication. No patch is currently available for affected AI/ML deployments.

RCE Path Traversal AI / ML Mlflow
NVD GitHub
CVSS 3.0
8.1
EPSS
15.6%
CVE-2025-10279 HIGH PATCH This Week

In mlflow version 2.20.3, the temporary directory used for creating Python virtual environments is assigned insecure world-writable permissions (0o777). [CVSS 7.0 HIGH]

Python Race Condition AI / ML RCE Mlflow
NVD GitHub
CVSS 3.0
7.0
EPSS
0.0%
CVE-2025-14279 HIGH PATCH This Week

MLFlow versions up to and including 3.4.0 are vulnerable to DNS rebinding attacks due to a lack of Origin header validation in the MLFlow REST server. This vulnerability allows malicious websites to bypass Same-Origin Policy protections and execute unauthorized calls against REST endpoints. [CVSS 8.1 HIGH]

Dns AI / ML Mlflow
NVD GitHub
CVSS 3.0
8.1
EPSS
0.0%
CVE-2025-52967 MEDIUM PATCH This Month

gateway_proxy_handler in MLflow before 3.1.0 lacks gateway_path validation.

SSRF Mlflow AI / ML
NVD GitHub
CVSS 3.1
5.8
EPSS
0.1%
CVE-2025-1474 MEDIUM POC PATCH This Month

In mlflow/mlflow version 2.18, an admin is able to create a new user account without setting a password. Rated medium severity (CVSS 5.5), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available.

Brute Force Authentication Bypass Mlflow AI / ML
NVD GitHub
CVSS 3.1
5.5
EPSS
0.1%
CVE-2025-1473 HIGH POC PATCH This Month

A Cross-Site Request Forgery (CSRF) vulnerability exists in the Signup feature of mlflow/mlflow versions 2.17.0 to 2.20.1. Rated high severity (CVSS 7.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available.

CSRF Mlflow AI / ML
NVD GitHub
CVSS 3.1
7.1
EPSS
0.1%
CVE-2025-0453 HIGH POC This Week

In mlflow/mlflow version 2.17.2, the `/graphql` endpoint is vulnerable to a denial of service attack. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Denial Of Service Mlflow AI / ML
NVD
CVSS 3.1
7.5
EPSS
0.1%
CVE-2024-8859 HIGH POC PATCH THREAT This Month

A path traversal vulnerability exists in mlflow/mlflow version 2.15.1. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and EPSS exploitation probability 26.9%.

Path Traversal Mlflow AI / ML
NVD GitHub
CVSS 3.0
7.5
EPSS
26.9%
CVE-2024-6838 MEDIUM POC This Month

In mlflow/mlflow version v2.13.2, a vulnerability exists that allows the creation or renaming of an experiment with a large number of integers in its name due to the lack of a limit on the experiment. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Denial Of Service Mlflow AI / ML
NVD
CVSS 3.1
5.3
EPSS
0.1%
CVE-2025-15031
EPSS 0% CVSS 9.1
CRITICAL PATCH Act Now

MLflow, a popular open-source machine learning lifecycle platform, contains a path traversal vulnerability in its pyfunc extraction process that allows arbitrary file writes. The vulnerability stems from unsafe use of tarfile.extractall without proper path validation, enabling attackers to craft malicious tar.gz files with directory traversal sequences or absolute paths to write files outside the intended extraction directory. This poses critical risk in multi-tenant environments and can lead to remote code execution, with a CVSS score of 8.1 and confirmed exploit details available via Huntr.

RCE Path Traversal Redhat +2
NVD VulDB
CVE-2025-14287
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Command injection vulnerability in MLflow versions before v3.7.0 that allows attackers to execute arbitrary commands by injecting malicious input through the --container parameter when deploying models to SageMaker. The vulnerability affects MLflow installations in development environments, CI/CD pipelines, and cloud deployments, with a CVSS score of 7.5 indicating high severity. No active exploitation or KEV listing is reported, and no EPSS data is available to assess real-world exploitation likelihood.

Command Injection RCE Code Injection +3
NVD VulDB
CVE-2026-2635
EPSS 1% CVSS 9.8
CRITICAL PATCH Act Now

Default password auth bypass in MLflow ML platform. EPSS 1.4%.

Authentication Bypass AI / ML Mlflow
NVD GitHub
CVE-2026-2033
EPSS 16% CVSS 8.1
HIGH PATCH Act Now

Unauthenticated remote code execution in MLflow Tracking Server through directory traversal in artifact file path handling enables attackers to execute arbitrary commands with service account privileges. The vulnerability stems from insufficient validation of user-supplied paths in file operations, allowing exploitation without authentication. No patch is currently available for affected AI/ML deployments.

RCE Path Traversal AI / ML +1
NVD GitHub
CVE-2025-10279
EPSS 0% CVSS 7.0
HIGH PATCH This Week

In mlflow version 2.20.3, the temporary directory used for creating Python virtual environments is assigned insecure world-writable permissions (0o777). [CVSS 7.0 HIGH]

Python Race Condition AI / ML +2
NVD GitHub
CVE-2025-14279
EPSS 0% CVSS 8.1
HIGH PATCH This Week

MLFlow versions up to and including 3.4.0 are vulnerable to DNS rebinding attacks due to a lack of Origin header validation in the MLFlow REST server. This vulnerability allows malicious websites to bypass Same-Origin Policy protections and execute unauthorized calls against REST endpoints. [CVSS 8.1 HIGH]

Dns AI / ML Mlflow
NVD GitHub
CVE-2025-52967
EPSS 0% CVSS 5.8
MEDIUM PATCH This Month

gateway_proxy_handler in MLflow before 3.1.0 lacks gateway_path validation.

SSRF Mlflow AI / ML
NVD GitHub
CVE-2025-1474
EPSS 0% CVSS 5.5
MEDIUM POC PATCH This Month

In mlflow/mlflow version 2.18, an admin is able to create a new user account without setting a password. Rated medium severity (CVSS 5.5), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available.

Brute Force Authentication Bypass Mlflow +1
NVD GitHub
CVE-2025-1473
EPSS 0% CVSS 7.1
HIGH POC PATCH This Month

A Cross-Site Request Forgery (CSRF) vulnerability exists in the Signup feature of mlflow/mlflow versions 2.17.0 to 2.20.1. Rated high severity (CVSS 7.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available.

CSRF Mlflow AI / ML
NVD GitHub
CVE-2025-0453
EPSS 0% CVSS 7.5
HIGH POC This Week

In mlflow/mlflow version 2.17.2, the `/graphql` endpoint is vulnerable to a denial of service attack. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Denial Of Service Mlflow AI / ML
NVD
CVE-2024-8859
EPSS 27% CVSS 7.5
HIGH POC PATCH THREAT This Month

A path traversal vulnerability exists in mlflow/mlflow version 2.15.1. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and EPSS exploitation probability 26.9%.

Path Traversal Mlflow AI / ML
NVD GitHub
CVE-2024-6838
EPSS 0% CVSS 5.3
MEDIUM POC This Month

In mlflow/mlflow version v2.13.2, a vulnerability exists that allows the creation or renaming of an experiment with a large number of integers in its name due to the lack of a limit on the experiment. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Denial Of Service Mlflow AI / ML
NVD

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy