CVE-2025-11200
- EPSS 0.39%
- Veröffentlicht 29.10.2025 19:42:03
- Zuletzt bearbeitet 04.11.2025 21:18:26
MLflow Weak Password Requirements Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of MLflow. Authentication is not required to exploit this vulnerability. The specifi...
CVE-2025-11201
- EPSS 11.55%
- Veröffentlicht 29.10.2025 19:37:10
- Zuletzt bearbeitet 04.11.2025 21:22:41
MLflow Tracking Server Model Creation Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of MLflow Tracking Server. Authentication is not required to...
CVE-2025-52967
- EPSS 0.04%
- Veröffentlicht 23.06.2025 00:00:00
- Zuletzt bearbeitet 23.06.2025 20:16:21
gateway_proxy_handler in MLflow before 3.1.0 lacks gateway_path validation.
CVE-2025-0453
- EPSS 0.11%
- Veröffentlicht 20.03.2025 10:11:02
- Zuletzt bearbeitet 15.10.2025 13:16:00
In mlflow/mlflow version 2.17.2, the `/graphql` endpoint is vulnerable to a denial of service attack. An attacker can create large batches of queries that repeatedly request all runs from a given experiment. This can tie up all the workers allocated ...
CVE-2025-1474
- EPSS 0.07%
- Veröffentlicht 20.03.2025 10:10:20
- Zuletzt bearbeitet 27.03.2025 15:36:42
In mlflow/mlflow version 2.18, an admin is able to create a new user account without setting a password. This vulnerability could lead to security risks, as accounts without passwords may be susceptible to unauthorized access. Additionally, this issu...
CVE-2025-1473
- EPSS 0.04%
- Veröffentlicht 20.03.2025 10:10:20
- Zuletzt bearbeitet 05.08.2025 17:05:22
A Cross-Site Request Forgery (CSRF) vulnerability exists in the Signup feature of mlflow/mlflow versions 2.17.0 to 2.20.1. This vulnerability allows an attacker to create a new account, which may be used to perform unauthorized actions on behalf of t...
CVE-2024-8859
- EPSS 16.07%
- Veröffentlicht 20.03.2025 10:09:53
- Zuletzt bearbeitet 05.08.2025 16:15:20
A path traversal vulnerability exists in mlflow/mlflow version 2.15.1. When users configure and use the dbfs service, concatenating the URL directly into the file protocol results in an arbitrary file read vulnerability. This issue occurs because onl...
CVE-2024-6838
- EPSS 0.13%
- Veröffentlicht 20.03.2025 10:09:11
- Zuletzt bearbeitet 01.04.2025 20:33:56
In mlflow/mlflow version v2.13.2, a vulnerability exists that allows the creation or renaming of an experiment with a large number of integers in its name due to the lack of a limit on the experiment name. This can cause the MLflow UI panel to become...
- EPSS 0.02%
- Veröffentlicht 25.11.2024 14:15:06
- Zuletzt bearbeitet 03.02.2025 15:05:50
Excessive directory permissions in MLflow leads to local privilege escalation when using spark_udf. This behavior can be exploited by a local attacker to gain elevated permissions by using a ToCToU attack. The issue is only relevant when the spark_ud...
CVE-2024-3099
- EPSS 0.06%
- Veröffentlicht 06.06.2024 19:15:59
- Zuletzt bearbeitet 21.11.2024 09:28:53
A vulnerability in mlflow/mlflow version 2.11.1 allows attackers to create multiple models with the same name by exploiting URL encoding. This flaw can lead to Denial of Service (DoS) as an authenticated user might not be able to use the intended mod...