PT-2026-28801 · Mlflow · Mlflow/Mlflow
Published
2026-03-30
·
Updated
2026-03-30
·
CVE-2025-15379
CVSS v3.1
10
Critical
| AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
A command injection vulnerability exists in MLflow's model serving container initialization code, specifically in the
install model dependencies to env() function. When deploying a model with env manager=LOCAL, MLflow reads dependency specifications from the model artifact's python env.yaml file and directly interpolates them into a shell command without sanitization. This allows an attacker to supply a malicious model artifact and achieve arbitrary command execution on systems that deploy the model. The vulnerability affects versions 3.8.0 and is fixed in version 3.8.2.Fix
Command Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Mlflow/Mlflow