TopVuln

High-risk vulnerability digests

CVE-2026-0596

  • CRITICAL

BIT-MLFLOW-2026-0596 Command Injection in mlflow/mlflow

Details

CVSS v3
9.6
NVD published
2026-03-31 15:16:10
EPSS
<0.1% probability · 23.3th percentile — 2026-04-17
Affected versions
cpe:2.3:a:lfprojects:mlflow:-:*:*:*:*:*:*:*
Summary
A command injection vulnerability exists in mlflow/mlflow when serving a model with `enable_mlserver=True`. The `model_uri` is embedded directly into a shell command executed via `bash -c` without proper sanitization. If the `model_uri` contains shell metacharacters, such as `$()` or backticks, it allows for command substitution and execution of attacker-controlled commands. This vulnerability affects the latest version of mlflow/mlflow and can lead to privilege escalation if a higher-privileged service serves models from a directory writable by lower-privileged users.
Remediation
Not available in our cache.
Exploit info
https://huntr.com/bounties/2e905add-f9f5-4309-a3db-b17de5981285

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.