TopVuln

High-risk vulnerability digests

CVE-2025-14287

  • HIGH

BIT-MLFLOW-2025-14287 Command Injection in mlflow/mlflow

Details

CVSS v3
7.5
NVD published
2026-03-16 14:17:55
EPSS
0.3% probability · 49.2th percentile — 2026-04-17
Affected versions
MLflow versions before v3.7.0
Summary
This is a command injection vulnerability affecting open-source MLflow versions prior to v3.7.0. The flaw allows attackers to execute arbitrary system commands by supplying a maliciously crafted container image name via the CLI --container parameter. It impacts development environments, CI/CD pipelines, and public cloud deployments running vulnerable MLflow instances.
Remediation
Upgrade all MLflow installations to version 3.7.0 or newer to patch this vulnerability. Restrict unauthenticated access to MLflow instances from public networks as a temporary mitigation. Validate and sanitize all user-supplied input to MLflow CLI commands before applying updates.
Exploit info
No public exploit found yet.

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.