DNS Rebinding Vulnerability in MLFlow by Databricks
CVE-2025-14279
8.1HIGH
What is CVE-2025-14279?
MLFlow versions up to 3.4.0 are susceptible to DNS rebinding attacks due to insufficient validation of the Origin header in its REST server. This weakness allows malicious websites to circumvent Same-Origin Policy protections, enabling unauthorized interactions with REST endpoints. Attackers can exploit this vulnerability to query, update, or delete experiments within MLFlow, posing risks of data exfiltration, loss, or alteration. The issue has been addressed in version 3.5.0.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
mlflow/mlflow < 3.5.0
References
CVSS V3.0
Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
