Description
In mlflow version 2.20.3, the temporary directory used for creating Python virtual environments is assigned insecure world-writable permissions (0o777). This vulnerability allows an attacker with write access to the `/tmp` directory to exploit a race condition and overwrite `.py` files in the virtual environment, leading to arbitrary code execution. The issue is resolved in version 3.4.0.
References (2)
Core 2
Core References
Exploit, Third Party Advisory
https://huntr.com/bounties/01d3b81e-13d1-43aa-b91a-443aec68bdc8
Scores
CVSS v3
7.0
EPSS
0.0001
EPSS Percentile
0.4%
Attack Vector
LOCAL
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-379
Status
published
Products (3)
lfprojects/mlflow
< 3.4.0
mlflow/mlflow/mlflow
unspecified - 3.4.0
pypi/mlflow
0 - 3.4.0rc0PyPI
Published
Feb 02, 2026
Tracked Since
Feb 18, 2026