CVE-2025-15031 PUBLISHED

Path Traversal Vulnerability in mlflow/mlflow

Assigner: @huntr_ai
Reserved: 22.12.2025 Published: 18.03.2026 Updated: 19.03.2026

A vulnerability in MLflow's pyfunc extraction process allows for arbitrary file writes due to improper handling of tar archive entries. Specifically, the use of tarfile.extractall without path validation enables crafted tar.gz files containing .. or absolute paths to escape the intended extraction directory. This issue affects the latest version of MLflow and poses a high/critical risk in scenarios involving multi-tenant environments or ingestion of untrusted artifacts, as it can lead to arbitrary file overwrites and potential remote code execution.

Metrics

CVSS Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
CVSS Score: 8.1

Product Status

Vendor mlflow
Product mlflow/mlflow
Versions
  • affected from unspecified to latest (incl.)

References

Problem Types

  • CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE