๐Ÿ” CVE Alert

CVE-2026-2734

MEDIUM 6.5

Authorization Bypass in SearchModelVersions in mlflow/mlflow

CVSS Score
6.5
EPSS Score
0.0%
EPSS Percentile
0th

In mlflow/mlflow versions up to 3.9.0, the `SearchModelVersions` REST API endpoint and the `mlflowSearchModelVersions` GraphQL query lack proper per-model authorization checks when basic authentication is enabled. This allows any authenticated user to enumerate all model versions across all registered models, regardless of their permission level. The issue arises due to the absence of `SearchModelVersions` in the `BEFORE_REQUEST_VALIDATORS` and `AFTER_REQUEST_HANDLERS` for the REST API, and its omission from `GraphQLAuthorizationMiddleware.PROTECTED_FIELDS` for GraphQL. This vulnerability can expose sensitive information such as model names, version descriptions, source URIs, tags, and other metadata, potentially revealing proprietary or confidential details in multi-tenant environments. The issue is resolved in version 3.10.0.

CWE CWE-284
Vendor mlflow
Product mlflow/mlflow
Published May 21, 2026
Stay Ahead of the Next One

Get instant alerts for mlflow mlflow/mlflow

Be the first to know when new medium vulnerabilities affecting mlflow mlflow/mlflow are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Affected Versions

mlflow / mlflow/mlflow
unspecified < 3.10.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
huntr.com: https://huntr.com/bounties/d632f783-b2c7-4a3b-af5e-1d693e841c08 github.com: https://github.com/mlflow/mlflow/commit/6989066af33fdcb03588fd71a1a67f8fc5ef12c9