Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15036: CWE-29 Path Traversal: '\..\filename' in mlflow mlflow/mlflow

0
Critical
VulnerabilityCVE-2025-15036cvecve-2025-15036cwe-29
Published: Mon Mar 30 2026 (03/30/2026, 01:16:06 UTC)
Source: CVE Database V5
Vendor/Project: mlflow
Product: mlflow/mlflow

Description

CVE-2025-15036 is a critical path traversal vulnerability in the mlflow/mlflow project affecting versions prior to v3. 7. 0. It exists in the extract_archive_to_dir function due to improper validation of tar archive member paths, allowing crafted tar. gz files to overwrite arbitrary files outside the intended extraction directory. Exploitation requires an attacker to supply a malicious archive and user interaction to trigger extraction. Successful exploitation can lead to full compromise of the host system, including privilege escalation and sandbox escape in multi-tenant or shared cluster environments. The vulnerability has a CVSS score of 9. 6, indicating critical severity with high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/30/2026, 01:53:33 UTC

Technical Analysis

CVE-2025-15036 is a critical path traversal vulnerability identified in the mlflow/mlflow open-source project, specifically within the extract_archive_to_dir function located in the mlflow/pyfunc/dbconnect_artifact_cache.py file. The vulnerability arises because the function does not properly validate the paths of members inside tar.gz archives before extraction. This lack of validation allows an attacker who can supply a malicious tar.gz archive to craft file paths containing sequences like "\..\filename" or "../filename" that traverse directories outside the intended extraction directory. Consequently, the attacker can overwrite arbitrary files on the host filesystem, potentially including sensitive configuration files, binaries, or system files. This can lead to privilege escalation, arbitrary code execution, or sandbox escape, especially in multi-tenant or shared cluster environments where mlflow is used to manage machine learning artifacts. The vulnerability affects all versions of mlflow prior to v3.7.0, where the issue was addressed. The CVSS v3.0 base score is 9.6, reflecting the vulnerability's ease of remote exploitation (no privileges required), the need for user interaction (triggering extraction), and the critical impact on confidentiality, integrity, and availability. Although no known exploits have been reported in the wild, the vulnerability's nature and severity make it a high-risk threat for organizations relying on mlflow for artifact management in data science workflows.

Potential Impact

The impact of CVE-2025-15036 is severe for organizations using mlflow in their machine learning lifecycle management, particularly in environments where multiple tenants or users share infrastructure. Exploitation can lead to arbitrary file overwrite, resulting in unauthorized modification or deletion of critical files, potentially causing system instability or denial of service. More critically, attackers can escalate privileges or execute arbitrary code by overwriting binaries or configuration files, leading to full system compromise. In cloud or containerized environments, this can allow attackers to escape sandbox restrictions, compromising other tenants or workloads on the same host. The breach of confidentiality, integrity, and availability can disrupt business operations, lead to data breaches, and cause significant reputational and financial damage. Given mlflow's widespread use in data science and AI workflows globally, the vulnerability poses a substantial risk to organizations relying on these technologies for critical decision-making and product development.

Mitigation Recommendations

To mitigate CVE-2025-15036, organizations should immediately upgrade mlflow to version 3.7.0 or later, where the vulnerability has been patched with proper validation of archive paths during extraction. Until upgrading is possible, implement strict input validation and sanitization on any tar.gz files used with mlflow, ensuring no path traversal sequences exist in archive member names. Employ runtime protections such as containerization with strict filesystem permissions and mandatory access controls (e.g., SELinux, AppArmor) to limit the impact of potential exploitation. Monitor logs for unusual file extraction activities or unexpected modifications to critical files. Restrict access to artifact upload and extraction functionalities to trusted users only, and consider implementing network segmentation to isolate mlflow servers from sensitive infrastructure. Regularly audit and review artifact repositories for suspicious or malformed archives. Finally, educate data science and DevOps teams about the risks of untrusted artifact sources and enforce secure artifact handling policies.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
@huntr_ai
Date Reserved
2025-12-23T01:57:43.568Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 69c9d408e6bfc5ba1d7f349e

Added to database: 3/30/2026, 1:38:16 AM

Last enriched: 3/30/2026, 1:53:33 AM

Last updated: 3/30/2026, 2:43:48 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses