Directory Traversal Remote Code Execution Vulnerability in MLflow Tracking Server
CVE-2026-2033
8.1HIGH
What is CVE-2026-2033?
A significant security flaw in MLflow Tracking Server allows remote attackers to execute arbitrary code. This issue arises from improper validation of user-supplied artifact file paths before these paths are utilized in file operations. As a result, an attacker can exploit this vulnerability without any authentication, executing code under the service account’s permissions. This exposure highlights the critical need for secure coding practices and the timely application of security patches.
Affected Version(s)
MLflow 3.1.1 and 5b9c01925c2e2a8cf0951f155a6a468ff99cfe0f
References
EPSS Score
14% chance of being exploited in the next 30 days.
CVSS V3.0
Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
