PT-2026-28801 · Mlflow · Mlflow/Mlflow

Published

2026-03-30

·

Updated

2026-03-30

·

CVE-2025-15379

CVSS v3.1

10

Critical

AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
A command injection vulnerability exists in MLflow's model serving container initialization code, specifically in the install model dependencies to env() function. When deploying a model with env manager=LOCAL, MLflow reads dependency specifications from the model artifact's python env.yaml file and directly interpolates them into a shell command without sanitization. This allows an attacker to supply a malicious model artifact and achieve arbitrary command execution on systems that deploy the model. The vulnerability affects versions 3.8.0 and is fixed in version 3.8.2.

Fix

Command Injection

Weakness Enumeration

Related Identifiers

CVE-2025-15379

Affected Products

Mlflow/Mlflow