CVE-2025-15036

Published Mar 30, 2026

Last updated 17 days ago

Overview

AI description

Automated description summarized from trusted sources.

CVE-2025-15036 is a path traversal vulnerability found in the `extract_archive_to_dir` function within the `mlflow/pyfunc/dbconnect_artifact_cache.py` file of the mlflow/mlflow repository. This flaw affects versions prior to v3.7.0. The vulnerability arises from insufficient validation of tar member paths during archive extraction. An attacker who can control the tar.gz file can exploit this to overwrite arbitrary files or achieve elevated privileges, potentially enabling them to escape the sandbox directory in multi-tenant or shared cluster environments.

Description
A path traversal vulnerability exists in the `extract_archive_to_dir` function within the `mlflow/pyfunc/dbconnect_artifact_cache.py` file of the mlflow/mlflow repository. This vulnerability, present in versions before v3.7.0, arises due to the lack of validation of tar member paths during extraction. An attacker with control over the tar.gz file can exploit this issue to overwrite arbitrary files or gain elevated privileges, potentially escaping the sandbox directory in multi-tenant or shared cluster environments.
Source
security@huntr.dev
NVD status
Analyzed
Products
mlflow

Risk scores

CVSS 3.1

Type
Primary
Base score
10
Impact score
6
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Severity
CRITICAL

CVSS 3.0

Type
Secondary
Base score
9.6
Impact score
6
Exploitability score
2.8
Vector string
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Severity
CRITICAL

Weaknesses

security@huntr.dev
CWE-29

Social media

Hype score
Not currently trending
  1. A critical path traversal vulnerability (CVE-2025-15036) has been identified in MLflow with a CVSS score of 9.6. The extract_archive_to_dir function within mlflow/pyfunc/dbconnect_artifact_cache.py lacks validation of tar member paths during extraction. An attacker with control

    @CheckmarxZero

    2 Apr 2026

    103 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  2. A critical path traversal vulnerability (CVE-2025-15036) has been identified in `MLFlow`. This flaw could allow unauthorized access to sensitive files. Assess your #MLFlow deployments and prepare for #patching. More details: https://t.co/nDDu9BmBmz

    @pulsepatchio

    1 Apr 2026

    148 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  3. ⚡ New CVE Alert: CVE-2025-15036 📊 Severity: 9.6 🚨 Risk Level: Critical 🧩 Affects: Multiple / Unspecified Products Reference: https://t.co/o90kGger0p #CVE-2025-15036 #CVE #Critical #CyberSecurity #InfoSec https://t.co/i7olyMNzuP

    @CVEarity

    30 Mar 2026

    136 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  4. CVE-2025-15036 A path traversal vulnerability exists in the `extract_archive_to_dir` function within the `mlflow/pyfunc/dbconnect_artifact_cache.py` file of the mlflow/mlflow reposi… https://t.co/V9RZEb0SDJ

    @CVEnew

    30 Mar 2026

    90 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  5. 🚨 CYBERDUDEBIVASH SENTINEL APEX ALERT 🚨 Threat: CVE-2025-15036 - Path Traversal Vulnerability in mlflow/mlflow Intel Report: https://t.co/dVi8iXe7yY

    @cyberbivash

    30 Mar 2026

    125 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  6. [CVE-2025-15036: CRITICAL] Critical path traversal vulnerability identified in mlflow repository's `extract_archive_to_dir` function allowing attackers to overwrite files or attain higher privileges pre v3.7.0.#cve,CVE-2025-15036,#cybersecurity https://t.co/mgMvf6dgDr

    @CveFindCom

    30 Mar 2026

    94 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  7. 🔴 CVE-2025-15036 - Critical A path traversal vulnerability exists in the `extract_archive_to_dir` function within the `mlflow/pyfunc/dbconnect_artifact_cache.py` file of the mlflow/mlflow repository. This vulnerabil... https://t.co/7cLOrG0Ed0 https://t.co/0ZsC4YNqu0

    @TheHackerWire

    30 Mar 2026

    142 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  8. 🚨 CVE-2025-15036: Path Traversal Vulnerability in ... MLFlow's tar extraction bypasses path validation—classic zip slip in ML pipelines means one malicious model archive own... https://t.co/qKVNIc67VG #netsec #vulnerability #CVE #sysadmin #zeroday

    @0dayPublishing

    30 Mar 2026

    159 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

Configurations