CVE-2025-0453: CWE-410 Insufficient Resource Pool in mlflow mlflow/mlflow
In mlflow/mlflow version 2.17.2, the `/graphql` endpoint is vulnerable to a denial of service attack. An attacker can create large batches of queries that repeatedly request all runs from a given experiment. This can tie up all the workers allocated by MLFlow, rendering the application unable to respond to other requests. This vulnerability is due to uncontrolled resource consumption.
AI Analysis
Technical Summary
CVE-2025-0453 identifies a denial of service (DoS) vulnerability in the MLflow open-source platform, specifically version 2.17.2, which is widely used for managing the machine learning lifecycle. The vulnerability exists in the /graphql endpoint, where an attacker can submit large batches of GraphQL queries that request all runs associated with a particular experiment. This behavior causes excessive consumption of worker threads or processes allocated by MLflow to handle incoming requests. Because MLflow does not sufficiently limit or control resource allocation for these queries, the workers become fully occupied processing the attacker's requests, effectively preventing legitimate users from receiving responses. This results in a denial of service condition, impacting the availability of the MLflow service. The root cause is classified under CWE-410 (Insufficient Resource Pool), indicating that the system fails to properly manage resource pools to prevent exhaustion. The attack can be executed remotely over the network without authentication or user interaction, but requires crafting complex query batches, which raises the attack complexity. No known exploits have been reported in the wild, and no official patches or fixes have been released at the time of this report. The CVSS v3.0 base score is 5.9, reflecting a medium severity level, with the vector indicating network attack vector, high attack complexity, no privileges required, no user interaction, unchanged scope, no confidentiality or integrity impact, and high availability impact.
Potential Impact
For European organizations leveraging MLflow in their AI/ML workflows, this vulnerability poses a significant risk to service availability. Disruption of MLflow services can halt machine learning experiment tracking, model versioning, and deployment pipelines, potentially delaying critical AI-driven business processes. Industries such as finance, healthcare, automotive, and manufacturing, which increasingly rely on ML models for decision-making and automation, could face operational downtime and productivity loss. Additionally, organizations with MLflow exposed to the internet or accessible by multiple users are at higher risk of remote exploitation. Although the vulnerability does not compromise data confidentiality or integrity, the denial of service could indirectly affect business continuity and service level agreements. The absence of known exploits reduces immediate risk, but the medium severity and ease of remote access warrant proactive mitigation to prevent potential attacks.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement strict rate limiting on the /graphql endpoint to restrict the number of queries per user or IP address within a given timeframe. Deploying resource quotas or limits on worker threads/processes dedicated to handling GraphQL queries can prevent resource exhaustion. Monitoring and anomaly detection systems should be configured to identify unusual query patterns or spikes in requests targeting experiment runs. If possible, restrict access to the MLflow service to trusted internal networks or VPNs to reduce exposure. Employ Web Application Firewalls (WAFs) with custom rules to block or throttle suspicious GraphQL query payloads. Organizations should also track updates from the MLflow project for patches or security advisories addressing this issue and plan timely application of fixes once available. Finally, consider segmenting MLflow infrastructure to isolate critical components and minimize the blast radius of potential DoS attacks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland
CVE-2025-0453: CWE-410 Insufficient Resource Pool in mlflow mlflow/mlflow
Description
In mlflow/mlflow version 2.17.2, the `/graphql` endpoint is vulnerable to a denial of service attack. An attacker can create large batches of queries that repeatedly request all runs from a given experiment. This can tie up all the workers allocated by MLFlow, rendering the application unable to respond to other requests. This vulnerability is due to uncontrolled resource consumption.
AI-Powered Analysis
Technical Analysis
CVE-2025-0453 identifies a denial of service (DoS) vulnerability in the MLflow open-source platform, specifically version 2.17.2, which is widely used for managing the machine learning lifecycle. The vulnerability exists in the /graphql endpoint, where an attacker can submit large batches of GraphQL queries that request all runs associated with a particular experiment. This behavior causes excessive consumption of worker threads or processes allocated by MLflow to handle incoming requests. Because MLflow does not sufficiently limit or control resource allocation for these queries, the workers become fully occupied processing the attacker's requests, effectively preventing legitimate users from receiving responses. This results in a denial of service condition, impacting the availability of the MLflow service. The root cause is classified under CWE-410 (Insufficient Resource Pool), indicating that the system fails to properly manage resource pools to prevent exhaustion. The attack can be executed remotely over the network without authentication or user interaction, but requires crafting complex query batches, which raises the attack complexity. No known exploits have been reported in the wild, and no official patches or fixes have been released at the time of this report. The CVSS v3.0 base score is 5.9, reflecting a medium severity level, with the vector indicating network attack vector, high attack complexity, no privileges required, no user interaction, unchanged scope, no confidentiality or integrity impact, and high availability impact.
Potential Impact
For European organizations leveraging MLflow in their AI/ML workflows, this vulnerability poses a significant risk to service availability. Disruption of MLflow services can halt machine learning experiment tracking, model versioning, and deployment pipelines, potentially delaying critical AI-driven business processes. Industries such as finance, healthcare, automotive, and manufacturing, which increasingly rely on ML models for decision-making and automation, could face operational downtime and productivity loss. Additionally, organizations with MLflow exposed to the internet or accessible by multiple users are at higher risk of remote exploitation. Although the vulnerability does not compromise data confidentiality or integrity, the denial of service could indirectly affect business continuity and service level agreements. The absence of known exploits reduces immediate risk, but the medium severity and ease of remote access warrant proactive mitigation to prevent potential attacks.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement strict rate limiting on the /graphql endpoint to restrict the number of queries per user or IP address within a given timeframe. Deploying resource quotas or limits on worker threads/processes dedicated to handling GraphQL queries can prevent resource exhaustion. Monitoring and anomaly detection systems should be configured to identify unusual query patterns or spikes in requests targeting experiment runs. If possible, restrict access to the MLflow service to trusted internal networks or VPNs to reduce exposure. Employ Web Application Firewalls (WAFs) with custom rules to block or throttle suspicious GraphQL query payloads. Organizations should also track updates from the MLflow project for patches or security advisories addressing this issue and plan timely application of fixes once available. Finally, consider segmenting MLflow infrastructure to isolate critical components and minimize the blast radius of potential DoS attacks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- @huntr_ai
- Date Reserved
- 2025-01-13T23:25:07.844Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68ef9b30178f764e1f470f14
Added to database: 10/15/2025, 1:01:36 PM
Last enriched: 10/15/2025, 1:05:04 PM
Last updated: 12/4/2025, 6:50:27 PM
Views: 39
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-63362: n/a
HighCVE-2025-63361: n/a
HighCVE-2025-14013: Cross Site Scripting in JIZHICMS
MediumCVE-2025-65637: n/a
UnknownCVE-2025-13488: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Sonatype Nexus Repository
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.