CVE-2025-15036

CRITICAL

Path Traversal Vulnerability in mlflow/mlflow

Title source: cna

Description

A path traversal vulnerability exists in the `extract_archive_to_dir` function within the `mlflow/pyfunc/dbconnect_artifact_cache.py` file of the mlflow/mlflow repository. This vulnerability, present in versions before v3.7.0, arises due to the lack of validation of tar member paths during extraction. An attacker with control over the tar.gz file can exploit this issue to overwrite arbitrary files or gain elevated privileges, potentially escaping the sandbox directory in multi-tenant or shared cluster environments.

Scores

CVSS v3 10.0
EPSS 0.0002
EPSS Percentile 4.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact total

Details

CWE
CWE-29
Status published
Products (3)
lfprojects/mlflow < 3.9.0
mlflow/mlflow/mlflow unspecified - 3.9.0
pypi/mlflow 0 - 3.9.0rc0PyPI
Published Mar 30, 2026
Tracked Since Mar 30, 2026