CVE-2025-15379
CRITICALCommand Injection in mlflow/mlflow
Title source: cnaDescription
A command injection vulnerability exists in MLflow's model serving container initialization code, specifically in the `_install_model_dependencies_to_env()` function. When deploying a model with `env_manager=LOCAL`, MLflow reads dependency specifications from the model artifact's `python_env.yaml` file and directly interpolates them into a shell command without sanitization. This allows an attacker to supply a malicious model artifact and achieve arbitrary command execution on systems that deploy the model. The vulnerability affects versions 3.8.0 and is fixed in version 3.8.2.
Scores
CVSS v3
9.8
EPSS
0.0024
EPSS Percentile
46.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
total
Details
CWE
CWE-77
Status
published
Products (3)
lfprojects/mlflow
3.8.0 - 3.8.1
mlflow/mlflow/mlflow
unspecified - 3.8.2
pypi/mlflow
0 - 3.9.0rc0PyPI
Published
Mar 30, 2026
Tracked Since
Mar 30, 2026