Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2775 articles · 109681 vulns · 38/41 feeds (7d)
← Back to list
10.0
CVE-2025-15379PATCHED
pypa · mlflow

A command injection vulnerability exists in MLflow's model serving container initialization code, specifically in the `_install_model_dependencies_to_env()` function. When deploying a model with `env_

Description

A command injection vulnerability exists in MLflow's model serving container initialization code, specifically in the `_install_model_dependencies_to_env()` function. When deploying a model with `env_manager=LOCAL`, MLflow reads dependency specifications from the model artifact's `python_env.yaml` file and directly interpolates them into a shell command without sanitization. This allows an attacker to supply a malicious model artifact and achieve arbitrary command execution on systems that deploy the model. The vulnerability affects versions 3.8.0 and is fixed in version 3.8.2.

Affected Products

VendorProductVersions
pypamlflowpip/mlflow: < 3.8.1

References

  • https://github.com/mlflow/mlflow/commit/361b6f620adf98385c6721e384fb5ef9a30bb05e
  • https://huntr.com/bounties/dc9c1c20-7879-4050-87df-4d095fe5ca75
CVSS 3.110.0 CRITICAL
VectorCVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
CISA KEV❌ No
Actively exploited❌ No
Patch available
mlflow@3.8.1
CWECWE-77
PublishedMar 30, 2026
Last enriched8d ago
Trending Score0
Source articles0
Independent0
Info Completeness5/14
Missing: vendor, product, versions, epss, kev, exploit, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

HIGHCVE-2026-39981
AGiXT has a Path Traversal in safe_join()
Trending: 26
HIGHCVE-2026-34824
Mesop: Unbounded Thread Creation in WebSocket Handler Leads to Denial of Service
Trending: 23
MEDIUMCVE-2026-34052
LTI JupyterHub Authenticator: Unbounded Memory Growth via Nonce Storage (Denial of Service)
Trending: 11
HIGHCVE-2024-49048
TorchGeo Remote Code Execution Vulnerability
Trending: 8
CRITICALCVE-2025-15036
A path traversal vulnerability exists in the `extract_archive_to_dir` function within the `mlflow/pyfunc/dbconnect_artifact_cache.py` file of the mlflow/mlflow repository. This vulnerability, present

Pin to Dashboard

Verification

State: verified
Confidence: 100%

Vulnerability Timeline

CVE Published
Mar 30, 2026
Patch Available
Mar 30, 2026
Discovered by ZDM
Apr 1, 2026