CVE-2026-2635

CRITICAL LAB

MLflow - Auth Bypass

Title source: llm

Description

MLflow Use of Default Password Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of MLflow. Authentication is not required to exploit this vulnerability. The specific flaw exists within the basic_auth.ini file. The file contains hard-coded default credentials. An attacker can leverage this vulnerability to bypass authentication and execute arbitrary code in the context of the administrator. Was ZDI-CAN-28256.

Exploits (1)

github WORKING POC 1 stars
by exploitintel · pythonpoc
https://github.com/exploitintel/eip-pocs-and-cves/tree/main/CVE-2026-2635

Scores

CVSS v3 9.8
EPSS 0.0139
EPSS Percentile 80.1%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Lab Environment

Lab screenshot
patched v3.10 vulnerable
docker pull ghcr.io/exploitintel/cve-2026-2635-vulnerable:latest
All Labs GitHub

Classification

CWE
CWE-1393
Status draft

Timeline

Published Feb 20, 2026
Tracked Since Feb 21, 2026