CVE-2026-33866
- EPSS 0.01%
- Veröffentlicht 07.04.2026 12:57:44
- Zuletzt bearbeitet 20.04.2026 18:45:16
MLflow is vulnerable to an authorization bypass affecting the AJAX endpoint used to download saved model artifacts. Due to missing access‑control validation, a user without permissions to a given experiment can directly query this endpoint and retrie...
CVE-2026-33865
- EPSS 0.01%
- Veröffentlicht 07.04.2026 12:57:38
- Zuletzt bearbeitet 20.04.2026 18:44:12
MLflow is vulnerable to Stored Cross-Site Scripting (XSS) caused by unsafe parsing of YAML-based MLmodel artifacts in its web interface. An authenticated attacker can upload a malicious MLmodel file containing a payload that executes when another use...
CVE-2026-0545
- EPSS 11.48%
- Veröffentlicht 03.04.2026 17:03:12
- Zuletzt bearbeitet 21.04.2026 01:45:33
In mlflow/mlflow, the FastAPI job endpoints under `/ajax-api/3.0/jobs/*` are not protected by authentication or authorization when the `basic-auth` app is enabled. This vulnerability affects the latest version of the repository. If job execution is e...
CVE-2026-0596
- EPSS 0.17%
- Veröffentlicht 31.03.2026 14:25:27
- Zuletzt bearbeitet 14.04.2026 16:01:29
A command injection vulnerability exists in mlflow/mlflow when serving a model with `enable_mlserver=True`. The `model_uri` is embedded directly into a shell command executed via `bash -c` without proper sanitization. If the `model_uri` contains shel...
CVE-2025-15379
- EPSS 0.27%
- Veröffentlicht 30.03.2026 07:16:57
- Zuletzt bearbeitet 28.04.2026 14:26:00
A command injection vulnerability exists in MLflow's model serving container initialization code, specifically in the `_install_model_dependencies_to_env()` function. When deploying a model with `env_manager=LOCAL`, MLflow reads dependency specificat...
- EPSS 0.04%
- Veröffentlicht 30.03.2026 01:16:06
- Zuletzt bearbeitet 28.04.2026 14:27:19
A path traversal vulnerability exists in the `extract_archive_to_dir` function within the `mlflow/pyfunc/dbconnect_artifact_cache.py` file of the mlflow/mlflow repository. This vulnerability, present in versions before v3.7.0, arises due to the lack ...
CVE-2025-15381
- EPSS 0.01%
- Veröffentlicht 27.03.2026 16:17:30
- Zuletzt bearbeitet 28.04.2026 14:32:08
In the latest version of mlflow/mlflow, when the `basic-auth` app is enabled, tracing and assessment endpoints are not protected by permission validators. This allows any authenticated user, including those with `NO_PERMISSIONS` on the experiment, to...
CVE-2025-15031
- EPSS 0.36%
- Veröffentlicht 18.03.2026 22:06:47
- Zuletzt bearbeitet 23.03.2026 17:48:45
A vulnerability in MLflow's pyfunc extraction process allows for arbitrary file writes due to improper handling of tar archive entries. Specifically, the use of `tarfile.extractall` without path validation enables crafted tar.gz files containing `..`...
CVE-2025-14287
- EPSS 0.29%
- Veröffentlicht 15.03.2026 09:27:36
- Zuletzt bearbeitet 14.04.2026 16:48:14
A command injection vulnerability exists in mlflow/mlflow versions before v3.7.0, specifically in the `mlflow/sagemaker/__init__.py` file at lines 161-167. The vulnerability arises from the direct interpolation of user-supplied container image names ...
- EPSS 0.01%
- Veröffentlicht 02.02.2026 10:36:22
- Zuletzt bearbeitet 14.04.2026 14:57:42
In mlflow version 2.20.3, the temporary directory used for creating Python virtual environments is assigned insecure world-writable permissions (0o777). This vulnerability allows an attacker with write access to the `/tmp` directory to exploit a race...