Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10279: CWE-379 Creation of Temporary File in Directory with Insecure Permissions in mlflow mlflow/mlflow

0
High
VulnerabilityCVE-2025-10279cvecve-2025-10279cwe-379
Published: Mon Feb 02 2026 (02/02/2026, 10:36:22 UTC)
Source: CVE Database V5
Vendor/Project: mlflow
Product: mlflow/mlflow

Description

CVE-2025-10279 is a high-severity vulnerability in mlflow version 2. 20. 3 where temporary directories for Python virtual environments are created with insecure world-writable permissions (0o777). This misconfiguration allows attackers with write access to the /tmp directory to exploit a race condition and overwrite . py files in the virtual environment, leading to arbitrary code execution. Exploitation requires local access with low privileges but no user interaction. The vulnerability affects confidentiality, integrity, and availability of affected systems. It is resolved in mlflow version 3. 4. 0.

AI-Powered Analysis

AILast updated: 02/02/2026, 11:14:34 UTC

Technical Analysis

CVE-2025-10279 is a vulnerability classified under CWE-379, involving the creation of temporary files in directories with insecure permissions within mlflow version 2.20.3. Mlflow, a popular open-source platform for managing the machine learning lifecycle, creates Python virtual environments in temporary directories assigned world-writable permissions (mode 0o777). This insecure permission setting allows any user with write access to the /tmp directory to exploit a race condition during the creation of these virtual environments. Specifically, an attacker can overwrite .py files in the virtual environment before they are used, enabling arbitrary code execution under the context of the mlflow process. The vulnerability requires local access with low privileges but does not require user interaction, making it a significant risk in multi-user or shared environments. The CVSS v3.0 score of 7.0 reflects high severity due to the high impact on confidentiality, integrity, and availability, although the attack complexity is high and privileges are required. The issue is addressed in mlflow version 3.4.0 by correcting the permissions on temporary directories to prevent unauthorized write access. No public exploits have been reported yet, but the vulnerability presents a critical risk for organizations running vulnerable mlflow versions, especially in environments where multiple users share system resources or where attackers can gain limited local access.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the security of machine learning workflows and data science environments that rely on mlflow. Successful exploitation can lead to arbitrary code execution, potentially allowing attackers to escalate privileges, access sensitive data, manipulate machine learning models, or disrupt operations. The impact extends to confidentiality, integrity, and availability of systems running vulnerable mlflow versions. Organizations using shared or multi-tenant systems, such as research institutions, universities, and cloud providers, are particularly vulnerable. The risk is heightened in environments where attackers can gain low-level local access, such as through compromised user accounts or insider threats. Given the growing adoption of mlflow in European tech sectors, this vulnerability could affect critical infrastructure and intellectual property if not mitigated promptly.

Mitigation Recommendations

1. Upgrade mlflow to version 3.4.0 or later, where the vulnerability is fixed. 2. Restrict permissions on temporary directories used by mlflow to prevent world-writable access; ensure directories are created with least privilege (e.g., 0o700). 3. Implement strict access controls on shared systems to limit write access to /tmp or equivalent temporary storage locations. 4. Monitor file system changes in temporary directories for suspicious activity indicative of race condition exploitation. 5. Use containerization or sandboxing to isolate mlflow environments, reducing the impact of potential code execution. 6. Conduct regular security audits and penetration tests focusing on local privilege escalation and file permission misconfigurations. 7. Educate users and administrators about the risks of insecure temporary file handling and the importance of patching vulnerable software promptly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
@huntr_ai
Date Reserved
2025-09-11T15:38:58.426Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 698083b8f9fa50a62f370592

Added to database: 2/2/2026, 11:00:08 AM

Last enriched: 2/2/2026, 11:14:34 AM

Last updated: 2/2/2026, 12:05:24 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats