CVE-2025-15036 PUBLISHED

Path Traversal Vulnerability in mlflow/mlflow

Assigner: @huntr_ai
Reserved: 23.12.2025 Published: 30.03.2026 Updated: 30.03.2026

A path traversal vulnerability exists in the extract_archive_to_dir function within the mlflow/pyfunc/dbconnect_artifact_cache.py file of the mlflow/mlflow repository. This vulnerability, present in versions before v3.7.0, arises due to the lack of validation of tar member paths during extraction. An attacker with control over the tar.gz file can exploit this issue to overwrite arbitrary files or gain elevated privileges, potentially escaping the sandbox directory in multi-tenant or shared cluster environments.

Metrics

CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
CVSS Score: 9.6

Product Status

Vendor mlflow
Product mlflow/mlflow
Versions
  • affected from unspecified to 3.9.0 (excl.)

References

Problem Types

  • CWE-29 Path Traversal: '\..\filename' CWE