CVE-2025-15379

CRITICAL

Command Injection in mlflow/mlflow

Title source: cna

Description

A command injection vulnerability exists in MLflow's model serving container initialization code, specifically in the `_install_model_dependencies_to_env()` function. When deploying a model with `env_manager=LOCAL`, MLflow reads dependency specifications from the model artifact's `python_env.yaml` file and directly interpolates them into a shell command without sanitization. This allows an attacker to supply a malicious model artifact and achieve arbitrary command execution on systems that deploy the model. The vulnerability affects versions 3.8.0 and is fixed in version 3.8.2.

Scores

CVSS v3 9.8
EPSS 0.0024
EPSS Percentile 46.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact total

Details

CWE
CWE-77
Status published
Products (3)
lfprojects/mlflow 3.8.0 - 3.8.1
mlflow/mlflow/mlflow unspecified - 3.8.2
pypi/mlflow 0 - 3.9.0rc0PyPI
Published Mar 30, 2026
Tracked Since Mar 30, 2026