CVE-2025-11201

GHSA-5cvj-7rg6-jggj CRITICAL
Published October 29, 2025
CISO Take

Patch MLflow to 3.0.0 immediately — this is unauthenticated RCE over the network, zero skills required, and MLflow Tracking Servers are routinely exposed on internal data science networks or cloud environments. If you cannot patch now, firewall the instance to known CI/CD IPs only and treat any previously exposed deployment as compromised. Rotate all credentials accessible from the MLflow host.

Affected Systems

Package Ecosystem Vulnerable Range Patched
mlflow pip >= 3.0.0rc0, < 3.0.0 3.0.0
mlflow pip No patch

Severity & Risk

CVSS 3.1
9.8 / 10
EPSS
9.1%
chance of exploitation in 30 days
KEV Status
Not in KEV
Sophistication
Trivial

Recommended Action

  1. 1. PATCH: Upgrade to MLflow 3.0.0 immediately (confirmed fixes in commits e7dc057 and 5f98ff9 in mlflow/mlflow repo). 2. ISOLATE: If immediate patching is blocked, firewall MLflow Tracking Server to restrict access to known internal CI/CD IPs only — block all external and lateral access. 3. LEAST PRIVILEGE: Audit MLflow service account permissions; revoke any cloud admin or broad S3/storage roles not strictly required. 4. DETECT: Search access logs for path traversal patterns in model creation API calls — look for '../', '%2e%2e', or unusual absolute paths. Set alerts on these patterns. 5. AUDIT FOR COMPROMISE: Inspect the MLflow host for unexpected files, new scheduled tasks, or anomalous outbound connections that may indicate prior exploitation. 6. ROTATE: As a precaution, rotate all credentials (cloud keys, DB passwords, API tokens) accessible from the MLflow host environment.

Classification

Compliance Impact

This CVE is relevant to:

EU AI Act
Article 15 - Accuracy, robustness and cybersecurity
ISO 42001
A.6.2.4 - AI system security A.8.2 - Incident management for AI systems
NIST AI RMF
GOVERN 6.1 - Policies for AI risk management MANAGE 2.2 - Mechanisms to maintain AI risk awareness
OWASP LLM Top 10
LLM03:2025 - Supply Chain Vulnerabilities

Technical Details

NVD Description

MLflow Tracking Server Model Creation Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of MLflow Tracking Server. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of model file paths. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-26921.

Exploitation Scenario

Attacker scans cloud environments for MLflow Tracking Servers on default ports (5000/5001) using Shodan or targeted AWS/GCP enumeration. Sends a crafted HTTP POST to the model file creation endpoint with a path traversal payload (e.g., '../../etc/cron.d/backdoor' or a writable path outside the intended directory) to drop an arbitrary file on the server filesystem. No credentials or prior access required. Payload writes a reverse shell cron job or web shell. Attacker gains code execution as the MLflow service account and immediately queries the cloud metadata endpoint for IAM credentials, then exfiltrates model weights, training data, and stored experiment artifacts. Full attack chain executable in under five minutes with a basic proof-of-concept script.

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Timeline

Published
October 29, 2025
Last Modified
December 5, 2025
First Seen
October 29, 2025