Plattform
python
Komponente
mlflow
Behoben in
3.8.0rc0
CVE-2025-14287 describes a Command Injection vulnerability discovered in MLflow, a platform for managing the machine learning lifecycle. This flaw allows attackers to execute arbitrary commands on systems running vulnerable versions of MLflow. The vulnerability affects versions of MLflow prior to 3.7.0rc0 and can be exploited through the --container parameter. A fix is available in version 3.8.0rc0.
The vulnerability resides in the mlflow/sagemaker/init.py file, specifically where user-supplied container image names are directly interpolated into shell commands without proper sanitization. An attacker can leverage this by crafting a malicious container image name containing shell commands. When this malicious name is passed through the --container parameter of the MLflow CLI, the injected commands will be executed with the privileges of the MLflow process. This could lead to complete system compromise, data exfiltration, or disruption of MLflow operations. The blast radius extends to any environment where MLflow is deployed, including development environments, CI/CD pipelines, and cloud-based machine learning platforms.
This vulnerability was publicly disclosed on 2026-03-16. There are currently no known public proof-of-concept exploits available. The vulnerability is not listed on the CISA KEV catalog at the time of writing. Given the ease of exploitation (passing a malicious string through a CLI parameter) and the potential impact, it is considered a medium-high probability threat.
Organizations heavily reliant on MLflow for machine learning model management, particularly those using it in CI/CD pipelines or cloud deployments, are at significant risk. Shared hosting environments where multiple users have access to the MLflow CLI are also vulnerable, as an attacker could potentially exploit the vulnerability on behalf of another user.
• python / mlflow:
import subprocess
import os
def check_mlflow_version():
try:
result = subprocess.check_output(['mlflow', '--version'], stderr=subprocess.STDOUT)
version = result.decode('utf-8').strip()
if version <= '3.7.0rc0':
print(f"MLflow version is vulnerable: {version}")
else:
print(f"MLflow version is not vulnerable: {version}")
except FileNotFoundError:
print("MLflow is not installed.")
check_mlflow_version()• generic web: Check for suspicious container image names being passed to MLflow CLI via command-line arguments or environment variables. Monitor access logs for unusual activity related to MLflow.
disclosure
Exploit-Status
EPSS
0.08% (24% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation is to upgrade MLflow to version 3.8.0rc0 or later, which contains the fix for this vulnerability. If upgrading immediately is not feasible, consider implementing input validation on the --container parameter to sanitize user-provided values. This could involve whitelisting allowed characters or rejecting inputs containing potentially malicious shell metacharacters. Furthermore, restrict the permissions of the MLflow process to minimize the impact of a successful command injection attack. After upgrading, verify the fix by attempting to execute a command through the --container parameter with a known malicious payload and confirming that it is properly sanitized and does not execute.
Actualice MLflow a la versión 3.7.0 o superior. Esto corrige la vulnerabilidad de inyección de comandos al sanitizar correctamente las entradas del usuario. Puede actualizar usando `pip install mlflow --upgrade`.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2025-14287 is a Command Injection vulnerability affecting MLflow versions before 3.8.0rc0. It allows attackers to execute arbitrary commands by manipulating the --container parameter.
You are affected if you are using MLflow versions 3.7.0 or earlier. Upgrade to 3.8.0rc0 or later to mitigate the risk.
Upgrade MLflow to version 3.8.0rc0 or later. As a temporary workaround, strictly validate and sanitize the --container parameter.
As of the current disclosure date, there are no known active exploits or campaigns targeting this vulnerability.
Refer to the MLflow security advisories and release notes on the official MLflow website for the latest information.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.
Lade deine requirements.txt-Datei hoch und wir sagen dir sofort, ob du betroffen bist.