Description
MLflow Use of Default Password Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of MLflow. Authentication is not required to exploit this vulnerability. The specific flaw exists within the basic_auth.ini file. The file contains hard-coded default credentials. An attacker can leverage this vulnerability to bypass authentication and execute arbitrary code in the context of the administrator. Was ZDI-CAN-28256.
Exploits (1)
github
WORKING POC
1 stars
by exploitintel · pythonpoc
https://github.com/exploitintel/eip-pocs-and-cves/tree/main/CVE-2026-2635
Scores
CVSS v3
9.8
EPSS
0.0139
EPSS Percentile
80.1%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lab Environment
patched
v3.10
vulnerable
docker pull ghcr.io/exploitintel/cve-2026-2635-vulnerable:latest
Classification
CWE
CWE-1393
Status
draft
Timeline
Published
Feb 20, 2026
Tracked Since
Feb 21, 2026