Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14287: CWE-94 Improper Control of Generation of Code in mlflow mlflow/mlflow

0
High
VulnerabilityCVE-2025-14287cvecve-2025-14287cwe-94
Published: Sun Mar 15 2026 (03/15/2026, 09:27:36 UTC)
Source: CVE Database V5
Vendor/Project: mlflow
Product: mlflow/mlflow

Description

CVE-2025-14287 is a high-severity command injection vulnerability in mlflow versions prior to 3. 7. 0, specifically in the mlflow/sagemaker/__init__. py file. It occurs due to unsafe interpolation of user-supplied container image names into shell commands executed via os. system(), allowing attackers to execute arbitrary commands by manipulating the --container CLI parameter. This vulnerability affects environments using MLflow, including development, CI/CD pipelines, and cloud deployments. Exploitation requires user interaction but no authentication, and the vulnerability impacts confidentiality, integrity, and availability. No known exploits are currently in the wild. Organizations relying on MLflow for machine learning lifecycle management should prioritize patching or mitigating this issue to prevent potential remote code execution attacks.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 01:07:09 UTC

Technical Analysis

CVE-2025-14287 is a command injection vulnerability classified under CWE-94 (Improper Control of Generation of Code) found in the MLflow open-source platform, specifically in versions before 3.7.0. The flaw exists in the mlflow/sagemaker/__init__.py file between lines 161-167, where user input provided via the --container parameter is directly interpolated into shell commands executed using Python's os.system() function without proper sanitization or validation. This unsafe coding practice allows an attacker to craft malicious container image names containing shell metacharacters or commands, resulting in arbitrary command execution on the host system. The vulnerability affects various deployment environments where MLflow is used, including local development setups, continuous integration/continuous deployment (CI/CD) pipelines, and cloud-based machine learning workflows. The CVSS v3.0 base score is 7.5, reflecting a high severity due to network attack vector, high impact on confidentiality, integrity, and availability, and requiring user interaction but no privileges or authentication. Although no known exploits have been reported in the wild, the vulnerability poses a significant risk because MLflow is widely adopted for managing machine learning lifecycle processes, and compromised systems could lead to data breaches, system takeover, or disruption of ML workflows.

Potential Impact

The impact of CVE-2025-14287 is substantial for organizations using MLflow in their machine learning operations. Successful exploitation can lead to remote code execution on systems running MLflow, potentially allowing attackers to gain unauthorized access, exfiltrate sensitive data, manipulate or corrupt machine learning models and data, disrupt ML workflows, or pivot to other parts of the network. This can result in loss of confidentiality, integrity, and availability of critical ML infrastructure. Organizations relying on MLflow for production ML pipelines, especially those integrated with cloud services or automated CI/CD environments, face increased risk of operational disruption and data compromise. The vulnerability also poses a risk to intellectual property embedded in ML models and datasets. Given MLflow’s growing adoption across industries, the threat surface is broad, affecting sectors such as technology, finance, healthcare, and any organization leveraging ML for business-critical applications.

Mitigation Recommendations

To mitigate CVE-2025-14287, organizations should upgrade MLflow to version 3.7.0 or later where the vulnerability is patched. If immediate upgrading is not feasible, apply the following mitigations: (1) Avoid using the --container parameter with untrusted input; restrict usage to trusted users only. (2) Implement input validation and sanitization on container image names before they are passed to shell commands, ensuring no shell metacharacters or injection vectors are present. (3) Replace os.system() calls with safer alternatives such as subprocess.run() with argument lists to avoid shell interpretation. (4) Employ runtime security controls such as container isolation, least privilege execution, and monitoring for anomalous command executions. (5) Restrict network access to MLflow services to trusted networks and users to reduce exposure. (6) Conduct code audits and penetration testing focusing on command injection vectors in MLflow deployments. (7) Monitor logs for suspicious CLI usage patterns involving the --container parameter. These targeted steps go beyond generic advice by focusing on the specific vulnerable code path and operational context.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
@huntr_ai
Date Reserved
2025-12-08T19:06:12.739Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 69b7c1499d4df4518337533f

Added to database: 3/16/2026, 8:37:29 AM

Last enriched: 3/24/2026, 1:07:09 AM

Last updated: 4/30/2026, 1:47:57 PM

Views: 86

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses