TopVuln

High-risk vulnerability digests

CVE-2025-15036

  • CRITICAL

Details

CVSS v3
9.6
NVD published
2026-03-30 02:16:14
Affected versions
MLflow versions before 3.7.0
Summary
This path traversal vulnerability impacts MLflow's artifact cache extraction functionality. The issue occurs because the library fails to validate tar member paths during extraction of user-supplied tar.gz artifacts. Attackers who control the input tar file can exploit this flaw to overwrite arbitrary files, escape sandbox restrictions, and gain elevated privileges on shared or multi-tenant clusters. The vulnerability is fixed in MLflow version 3.7.0 and newer.
Remediation
Upgrade MLflow to version 3.7.0 or later to patch this vulnerability. Implement least-privilege file permissions for MLflow processes to limit the impact of exploitation until upgrades are completed. Audit shared multi-tenant MLflow clusters for unauthorized file changes after applying the patch.
Exploit info
No public exploit found yet.

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.