CVE-2025-10279: CWE-379 Creation of Temporary File in Directory with Insecure Permissions in mlflow mlflow/mlflow
CVE-2025-10279 is a high-severity vulnerability in mlflow version 2. 20. 3 where temporary directories for Python virtual environments are created with insecure world-writable permissions (0o777). This misconfiguration allows attackers with write access to the /tmp directory to exploit a race condition and overwrite . py files in the virtual environment, leading to arbitrary code execution. Exploitation requires local access with low privileges but no user interaction. The vulnerability affects confidentiality, integrity, and availability of affected systems. It is resolved in mlflow version 3. 4. 0.
AI Analysis
Technical Summary
CVE-2025-10279 is a vulnerability classified under CWE-379, involving the creation of temporary files in directories with insecure permissions within mlflow version 2.20.3. Mlflow, a popular open-source platform for managing the machine learning lifecycle, creates Python virtual environments in temporary directories assigned world-writable permissions (mode 0o777). This insecure permission setting allows any user with write access to the /tmp directory to exploit a race condition during the creation of these virtual environments. Specifically, an attacker can overwrite .py files in the virtual environment before they are used, enabling arbitrary code execution under the context of the mlflow process. The vulnerability requires local access with low privileges but does not require user interaction, making it a significant risk in multi-user or shared environments. The CVSS v3.0 score of 7.0 reflects high severity due to the high impact on confidentiality, integrity, and availability, although the attack complexity is high and privileges are required. The issue is addressed in mlflow version 3.4.0 by correcting the permissions on temporary directories to prevent unauthorized write access. No public exploits have been reported yet, but the vulnerability presents a critical risk for organizations running vulnerable mlflow versions, especially in environments where multiple users share system resources or where attackers can gain limited local access.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the security of machine learning workflows and data science environments that rely on mlflow. Successful exploitation can lead to arbitrary code execution, potentially allowing attackers to escalate privileges, access sensitive data, manipulate machine learning models, or disrupt operations. The impact extends to confidentiality, integrity, and availability of systems running vulnerable mlflow versions. Organizations using shared or multi-tenant systems, such as research institutions, universities, and cloud providers, are particularly vulnerable. The risk is heightened in environments where attackers can gain low-level local access, such as through compromised user accounts or insider threats. Given the growing adoption of mlflow in European tech sectors, this vulnerability could affect critical infrastructure and intellectual property if not mitigated promptly.
Mitigation Recommendations
1. Upgrade mlflow to version 3.4.0 or later, where the vulnerability is fixed. 2. Restrict permissions on temporary directories used by mlflow to prevent world-writable access; ensure directories are created with least privilege (e.g., 0o700). 3. Implement strict access controls on shared systems to limit write access to /tmp or equivalent temporary storage locations. 4. Monitor file system changes in temporary directories for suspicious activity indicative of race condition exploitation. 5. Use containerization or sandboxing to isolate mlflow environments, reducing the impact of potential code execution. 6. Conduct regular security audits and penetration tests focusing on local privilege escalation and file permission misconfigurations. 7. Educate users and administrators about the risks of insecure temporary file handling and the importance of patching vulnerable software promptly.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Ireland
CVE-2025-10279: CWE-379 Creation of Temporary File in Directory with Insecure Permissions in mlflow mlflow/mlflow
Description
CVE-2025-10279 is a high-severity vulnerability in mlflow version 2. 20. 3 where temporary directories for Python virtual environments are created with insecure world-writable permissions (0o777). This misconfiguration allows attackers with write access to the /tmp directory to exploit a race condition and overwrite . py files in the virtual environment, leading to arbitrary code execution. Exploitation requires local access with low privileges but no user interaction. The vulnerability affects confidentiality, integrity, and availability of affected systems. It is resolved in mlflow version 3. 4. 0.
AI-Powered Analysis
Technical Analysis
CVE-2025-10279 is a vulnerability classified under CWE-379, involving the creation of temporary files in directories with insecure permissions within mlflow version 2.20.3. Mlflow, a popular open-source platform for managing the machine learning lifecycle, creates Python virtual environments in temporary directories assigned world-writable permissions (mode 0o777). This insecure permission setting allows any user with write access to the /tmp directory to exploit a race condition during the creation of these virtual environments. Specifically, an attacker can overwrite .py files in the virtual environment before they are used, enabling arbitrary code execution under the context of the mlflow process. The vulnerability requires local access with low privileges but does not require user interaction, making it a significant risk in multi-user or shared environments. The CVSS v3.0 score of 7.0 reflects high severity due to the high impact on confidentiality, integrity, and availability, although the attack complexity is high and privileges are required. The issue is addressed in mlflow version 3.4.0 by correcting the permissions on temporary directories to prevent unauthorized write access. No public exploits have been reported yet, but the vulnerability presents a critical risk for organizations running vulnerable mlflow versions, especially in environments where multiple users share system resources or where attackers can gain limited local access.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the security of machine learning workflows and data science environments that rely on mlflow. Successful exploitation can lead to arbitrary code execution, potentially allowing attackers to escalate privileges, access sensitive data, manipulate machine learning models, or disrupt operations. The impact extends to confidentiality, integrity, and availability of systems running vulnerable mlflow versions. Organizations using shared or multi-tenant systems, such as research institutions, universities, and cloud providers, are particularly vulnerable. The risk is heightened in environments where attackers can gain low-level local access, such as through compromised user accounts or insider threats. Given the growing adoption of mlflow in European tech sectors, this vulnerability could affect critical infrastructure and intellectual property if not mitigated promptly.
Mitigation Recommendations
1. Upgrade mlflow to version 3.4.0 or later, where the vulnerability is fixed. 2. Restrict permissions on temporary directories used by mlflow to prevent world-writable access; ensure directories are created with least privilege (e.g., 0o700). 3. Implement strict access controls on shared systems to limit write access to /tmp or equivalent temporary storage locations. 4. Monitor file system changes in temporary directories for suspicious activity indicative of race condition exploitation. 5. Use containerization or sandboxing to isolate mlflow environments, reducing the impact of potential code execution. 6. Conduct regular security audits and penetration tests focusing on local privilege escalation and file permission misconfigurations. 7. Educate users and administrators about the risks of insecure temporary file handling and the importance of patching vulnerable software promptly.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- @huntr_ai
- Date Reserved
- 2025-09-11T15:38:58.426Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 698083b8f9fa50a62f370592
Added to database: 2/2/2026, 11:00:08 AM
Last enriched: 2/2/2026, 11:14:34 AM
Last updated: 2/2/2026, 12:05:24 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0599: CWE-400 Uncontrolled Resource Consumption in huggingface huggingface/text-generation-inference
HighCVE-2025-7105: CWE-400 Uncontrolled Resource Consumption in danny-avila danny-avila/librechat
MediumCVE-2025-6208: CWE-400 Uncontrolled Resource Consumption in run-llama run-llama/llama_index
MediumCVE-2024-5986: CWE-73 External Control of File Name or Path in h2oai h2oai/h2o-3
CriticalCVE-2024-5386: CWE-1125 Excessive Attack Surface in lunary-ai lunary-ai/lunary
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.