CVE-2025-15379
MLflow · MLflow
A command injection vulnerability in MLflow's model serving container initialization allows attackers to execute arbitrary commands by supplying malicious model artifacts with unsanitized dependencies.
Executive summary
MLflow version 3.8.0 is subject to a critical command injection vulnerability that allows an attacker to achieve full system compromise through the deployment of malicious model artifacts.
Vulnerability
This flaw exists in the _install_model_dependencies_to_env() function where dependency specifications from python_env.yaml are interpolated into shell commands without sanitization. An attacker with the ability to supply or register a malicious model artifact can trigger arbitrary code execution when the model is deployed using the LOCAL environment manager.
Business impact
A successful exploit grants the attacker the same privileges as the MLflow service, potentially leading to total loss of confidentiality, integrity, and availability. Given the CVSS score of 10.0, this represents the highest possible risk, as it could allow for data exfiltration, lateral movement within the infrastructure, and permanent system damage.
Remediation
Immediate Action: Upgrade MLflow to version 3.8.2 or later immediately to patch the vulnerable container initialization logic.
Proactive Monitoring: Review system logs for unusual shell command execution originating from the MLflow model serving process and monitor for unauthorized model registration activities.
Compensating Controls: Restrict model deployment permissions to trusted personnel and implement network segmentation to isolate model serving containers from sensitive internal resources.
Exploitation status
Public Exploit Available: false
Analyst recommendation
The severity of this command injection flaw cannot be overstated, as indicated by the CVSS 10.0 rating. Organizations utilizing MLflow for model serving must prioritize the update to version 3.8.2 to mitigate the risk of arbitrary command execution and potential infrastructure takeover.