Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-25723: n/a

0
High
VulnerabilityCVE-2024-25723cvecve-2024-25723
Published: Tue Feb 27 2024 (02/27/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

ZenML Server in the ZenML machine learning package before 0.46.7 for Python allows remote privilege escalation because the /api/v1/users/{user_name_or_id}/activate REST API endpoint allows access on the basis of a valid username along with a new password in the request body. These are also patched versions: 0.44.4, 0.43.1, and 0.42.2.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 10:44:10 UTC

Technical Analysis

CVE-2024-25723 is a critical vulnerability found in the ZenML Server component of the ZenML machine learning package for Python, affecting versions prior to 0.46.7. The vulnerability arises from improper authorization controls on the /api/v1/users/{user_name_or_id}/activate REST API endpoint. This endpoint allows an attacker who can provide a valid username and a new password in the request body to remotely escalate privileges. Specifically, the endpoint does not sufficiently verify whether the requester is authorized to activate or reset the password for the specified user, leading to a privilege escalation scenario. The vulnerability is classified under CWE-284 (Improper Access Control), indicating a failure to enforce correct authorization policies. The CVSS v3.1 base score is 8.8, reflecting the vulnerability’s ease of exploitation over the network (AV:N), low attack complexity (AC:L), requirement of privileges (PR:L), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Multiple patched versions have been released (0.42.2, 0.43.1, 0.44.4, and 0.46.7) to address this issue. Although no active exploits have been reported, the vulnerability poses a significant risk to organizations using ZenML for machine learning workflows, especially those exposing the server API externally or within less secure internal networks.

Potential Impact

The vulnerability allows an attacker with some level of access to the ZenML Server API to escalate privileges remotely, potentially gaining administrative control over the system. This can lead to unauthorized access to sensitive machine learning models, data, and workflows, compromising confidentiality and integrity. Additionally, an attacker could disrupt operations by modifying or deleting critical resources, impacting availability. Organizations relying on ZenML for production ML pipelines may face data breaches, intellectual property theft, or operational downtime. The ease of exploitation and high impact score make this a critical concern for any environment where ZenML Server is deployed, particularly if exposed to untrusted networks or insufficiently segmented internal networks.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately upgrade ZenML Server to one of the patched versions: 0.42.2, 0.43.1, 0.44.4, or preferably 0.46.7 or later. Additionally, restrict access to the ZenML Server API endpoints using network segmentation and firewall rules to limit exposure to trusted users and systems only. Implement strong authentication and authorization mechanisms around the API, ensuring that only properly authenticated and authorized users can perform sensitive operations such as user activation or password resets. Regularly audit API access logs for suspicious activity. If upgrading is not immediately feasible, consider disabling or restricting the vulnerable endpoint temporarily. Finally, integrate ZenML Server into a broader security monitoring and incident response framework to detect and respond to potential exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-02-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d6db7ef31ef0b572106

Added to database: 2/25/2026, 9:45:17 PM

Last enriched: 2/26/2026, 10:44:10 AM

Last updated: 4/11/2026, 11:22:16 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses