๐Ÿ” CVE Alert

CVE-2025-15031

HIGH 8.1

Path Traversal Vulnerability in mlflow/mlflow

CVSS Score
8.1
EPSS Score
0.0%
EPSS Percentile
0th

A vulnerability in MLflow's pyfunc extraction process allows for arbitrary file writes due to improper handling of tar archive entries. Specifically, the use of `tarfile.extractall` without path validation enables crafted tar.gz files containing `..` or absolute paths to escape the intended extraction directory. This issue affects the latest version of MLflow and poses a high/critical risk in scenarios involving multi-tenant environments or ingestion of untrusted artifacts, as it can lead to arbitrary file overwrites and potential remote code execution.

CWE CWE-22
Vendor mlflow
Product mlflow/mlflow
Published Mar 18, 2026
Last Updated Mar 19, 2026
Stay Ahead of the Next One

Get instant alerts for mlflow mlflow/mlflow

Be the first to know when new high vulnerabilities affecting mlflow mlflow/mlflow are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Affected Versions

mlflow / mlflow/mlflow
unspecified โ‰ค latest

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
huntr.com: https://huntr.com/bounties/09856f77-f968-446f-a930-657d126efe4e