๐Ÿ” CVE Alert

CVE-2026-2614

HIGH 7.5

Arbitrary File Read via Prompt Tag Source Validation Bypass in mlflow/mlflow

CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
12th

A vulnerability in the `_create_model_version()` handler of `mlflow/server/handlers.py` in mlflow/mlflow versions 3.9.0 and earlier allows an unauthenticated remote attacker to read arbitrary files from the server's filesystem. The issue arises when a `CreateModelVersion` request includes the tag `mlflow.prompt.is_prompt`, which bypasses source path validation. This enables an attacker to store an arbitrary local filesystem path as the model version source. The `get_model_version_artifact_handler()` function later uses this source to serve files without verifying the model version's prompt status, leading to a complete confidentiality compromise. This issue is fixed in version 3.10.0.

CWE CWE-22
Vendor mlflow
Product mlflow/mlflow
Published May 11, 2026
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for mlflow mlflow/mlflow

Be the first to know when new high vulnerabilities affecting mlflow mlflow/mlflow are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Affected Versions

mlflow / mlflow/mlflow
unspecified < 3.10.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
huntr.com: https://huntr.com/bounties/19380271-3fbf-4beb-987e-6fd7069c55e6 github.com: https://github.com/mlflow/mlflow/commit/6e801f4259d96804c73107315b24cef0f6aa115a