AI description
CVE-2025-15379 describes a command injection vulnerability found within the model serving container initialization code of MLflow. Specifically, the flaw resides in the `_install_model_dependencies_to_env()` function. When a model is deployed with `env_manager=LOCAL`, MLflow processes dependency specifications from the `python_env.yaml` file within the model artifact. The vulnerability arises because these specifications are directly incorporated into a shell command without proper sanitization, enabling an attacker to provide a malicious model artifact and execute arbitrary commands on systems deploying the model. This issue impacts MLflow versions 3.8.0 and has been addressed in version 3.8.2.
- Description
- A command injection vulnerability exists in MLflow's model serving container initialization code, specifically in the `_install_model_dependencies_to_env()` function. When deploying a model with `env_manager=LOCAL`, MLflow reads dependency specifications from the model artifact's `python_env.yaml` file and directly interpolates them into a shell command without sanitization. This allows an attacker to supply a malicious model artifact and achieve arbitrary command execution on systems that deploy the model. The vulnerability affects versions 3.8.0 and is fixed in version 3.8.2.
- Source
- security@huntr.dev
- NVD status
- Analyzed
- Products
- mlflow
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 3.0
- Type
- Secondary
- Base score
- 10
- Impact score
- 6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
- Severity
- CRITICAL
- security@huntr.dev
- CWE-77
- Hype score
- Not currently trending
`MLflow` is vulnerable to command injection (CVE-2025-15379), potentially allowing arbitrary code execution. Assess impact in your `MLflow` deployments. #MLflow #CommandInjection #InfoSec https://t.co/E0sk91Tfrr
@pulsepatchio
1 Apr 2026
147 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
everyone is now panicking about AI hacking we've been AI hacking 10.0 critical in MLFlow by AI security agent waclaude (button pushed by me lol) CVE-2025-15379 https://t.co/P8zC6x5KlE
@_colemurray
31 Mar 2026
1542 Impressions
0 Retweets
13 Likes
3 Bookmarks
1 Reply
1 Quote
CVE-2025-15379 A command injection vulnerability exists in MLflow's model serving container initialization code, specifically in the `_install_model_dependencies_to_env()` function.… https://t.co/Pb2igaE07J
@CVEnew
30 Mar 2026
107 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🔍 Today's Top Vulnerabilities 🔴 CVE-2025-15379 | CVSS 10.0 🔴 CVE-2026-32922 | CVSS 9.9 🔴 CVE-2026-32975 | CVSS 9.8 🔗 https://t.co/MGnNrzO0Nd #CVE #Vulnerability #ThreatIntel
@ctiwatchcloud
30 Mar 2026
128 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
[CVE-2025-15379: CRITICAL] Critical command injection vulnerability in MLflow version 3.8.0 enables arbitrary command execution. Upgrade to version 3.8.2 to fix the security flaw. #CyberSecurity#cve,CVE-2025-15379,#cybersecurity https://t.co/u5G2s3hvaC
@CveFindCom
30 Mar 2026
80 Impressions
0 Retweets
0 Likes
1 Bookmark
0 Replies
0 Quotes
🔴 CVE-2025-15379 - Critical A command injection vulnerability exists in MLflow's model serving container initialization code, specifically in the `_install_model_dependencies_to_env()` function. When deploying a mod... https://t.co/NqgoSRzhBw https://t.co/FuHN61P2CN
@TheHackerWire
30 Mar 2026
144 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2025-15379: Command Injection in mlflow/mlfl... MLflow's `python_env.yaml` parsing becomes a shell injection goldmine - malicious model artifacts = instant RCE on depl... https://t.co/2hP6djn3kR #netsec #vulnerability #CVE #sysadmin #zeroday
@0dayPublishing
30 Mar 2026
158 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CB8C7729-F7F9-4179-B66D-4E76EFE4115D",
"versionEndIncluding": "3.8.1",
"versionStartIncluding": "3.8.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]