Command Injection Vulnerability in mlflow by Databricks
CVE-2026-0596

9.6CRITICAL

Key Information:

Vendor

Mlflow

Vendor
CVE Published:
31 March 2026

What is CVE-2026-0596?

A critical command injection vulnerability exists in the mlflow framework when serving models with 'enable_mlserver=True'. This occurs due to the 'model_uri' being directly inserted into a shell command executed via 'bash -c', lacking adequate sanitization measures. If crafted with shell metacharacters, this can facilitate command substitution, giving an attacker the ability to execute malicious commands. It particularly poses a risk if a higher-privileged service serves models from directories writable by lower-privileged users, thus escalating privileges.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

mlflow/mlflow <= unspecified

References

CVSS V3.0

Score:
9.6
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.