Plattform
python
Komponente
mlflow
Behoben in
3.8.2
CVE-2025-15381 represents a vulnerability in the basic-auth application within the MLflow platform. This flaw allows authenticated users, even those with limited permissions (e.g., NO_PERMISSIONS on experiments), to access trace information and create assessments for traces they should not have access to. This impacts the confidentiality of trace metadata and the integrity of assessment data.
The vulnerability arises because the tracing and assessment endpoints are not properly protected by permission validators when the basic-auth app is enabled. An authenticated user can bypass these checks and access sensitive trace data, potentially revealing information about model training and performance. Furthermore, they can create assessments for traces they are not authorized to evaluate, leading to inaccurate or misleading results. This could be exploited to gain insights into proprietary models or manipulate performance metrics.
CVE-2025-15381 is currently not listed on KEV or EPSS. The CVSS score of 8.1 indicates a high severity. Public proof-of-concept (POC) exploits are not yet publicly available. The vulnerability was published on 2026-03-27.
Exploit-Status
EPSS
0.01% (1% Perzentil)
CISA SSVC
CVSS-Vektor
The recommended mitigation for CVE-2025-15381 is to upgrade to a patched version of MLflow that includes proper permission validation for the tracing and assessment endpoints. Until a patch is available, consider disabling the basic-auth app if it is not essential. Implement stricter access controls to limit the number of users with authentication credentials. Review and audit user permissions regularly to ensure that users only have access to the resources they need. After upgrading, confirm the fix by attempting to access trace data or create assessments as a user with limited permissions.
Actualice la biblioteca mlflow a la última versión disponible. Esto solucionará la vulnerabilidad que permite el acceso no autorizado a los endpoints de tracing y assessment cuando la aplicación `basic-auth` está habilitada.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
In mlflow, tracing endpoints allow you to visualize the execution flow of an experiment, while assessment endpoints allow you to analyze and compare the results of different runs.
It means the user does not have explicit permissions to access the experiment's resources.
The configuration for disabling basic authentication varies depending on how mlflow is deployed. Refer to the mlflow documentation for specific instructions.
You can implement custom access controls using middleware or decorators in your application to verify the user's permissions before allowing access to the tracing and assessment endpoints.
You can find more information about this vulnerability in the corresponding CVE entry: CVE-2025-15381.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.
Lade deine requirements.txt-Datei hoch und wir sagen dir sofort, ob du betroffen bist.