Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15381: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in mlflow mlflow/mlflow

0
High
VulnerabilityCVE-2025-15381cvecve-2025-15381cwe-200
Published: Fri Mar 27 2026 (03/27/2026, 16:17:30 UTC)
Source: CVE Database V5
Vendor/Project: mlflow
Product: mlflow/mlflow

Description

In the latest version of mlflow/mlflow, when the `basic-auth` app is enabled, tracing and assessment endpoints are not protected by permission validators. This allows any authenticated user, including those with `NO_PERMISSIONS` on the experiment, to read trace information and create assessments for traces they should not have access to. This vulnerability impacts confidentiality by exposing trace metadata and integrity by allowing unauthorized creation of assessments. Deployments using `mlflow server --app-name=basic-auth` are affected.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 18:04:55 UTC

Technical Analysis

CVE-2025-15381 is a vulnerability identified in the mlflow/mlflow project, specifically impacting deployments that use the 'basic-auth' application mode. Mlflow is an open-source platform widely used for managing the machine learning lifecycle, including experimentation, reproducibility, and deployment. The vulnerability arises because the tracing and assessment endpoints within the basic-auth app do not enforce permission validators. Consequently, any authenticated user, regardless of their assigned permissions (including those explicitly assigned NO_PERMISSIONS on experiments), can access sensitive trace metadata and create assessments for traces they should not be authorized to view or modify. This leads to an exposure of sensitive information (classified under CWE-200) and unauthorized data integrity modification. The vulnerability affects confidentiality by leaking trace metadata, which may include sensitive operational or experimental details, and impacts integrity by allowing unauthorized creation of assessments that could mislead or corrupt trace data analysis. The CVSS v3.0 score of 8.1 reflects the high severity, with an attack vector over the network, low attack complexity, requiring low privileges (authenticated user), no user interaction, and impacting confidentiality and integrity but not availability. The affected versions are unspecified, but any deployment running mlflow server with the basic-auth app enabled is at risk. No patches or known exploits have been reported at the time of publication.

Potential Impact

The vulnerability poses significant risks to organizations leveraging mlflow for managing machine learning experiments and workflows. Exposure of trace metadata can lead to leakage of sensitive intellectual property, experimental results, or operational details that adversaries could use for competitive advantage or further attacks. Unauthorized creation of assessments undermines data integrity, potentially corrupting experiment evaluations or audit trails, which can mislead data scientists and decision-makers. This can degrade trust in the ML lifecycle management and impact compliance with data governance policies. Since the vulnerability requires only authenticated access, insider threats or compromised credentials can be exploited to gain unauthorized access. The lack of user interaction and network-based attack vector increases the likelihood of exploitation in environments where basic-auth is enabled without additional access controls. Organizations in sectors relying heavily on ML workflows—such as technology, finance, healthcare, and research institutions—face elevated risks of data breaches and operational disruption.

Mitigation Recommendations

To mitigate CVE-2025-15381, organizations should first verify if their mlflow deployments use the basic-auth app. If so, immediate steps include restricting access to the mlflow server to trusted networks and users, implementing stronger authentication mechanisms beyond basic-auth (e.g., OAuth, SSO), and applying network segmentation to limit exposure. Since no patches are currently available, administrators should consider disabling the basic-auth app or replacing it with more secure authentication and authorization frameworks. Additionally, implementing strict role-based access controls (RBAC) at the application or infrastructure level can prevent unauthorized users from accessing sensitive endpoints. Monitoring and logging access to tracing and assessment endpoints should be enhanced to detect anomalous activities. Organizations should stay updated with mlflow releases for forthcoming patches addressing this vulnerability and plan prompt deployment once available. Conducting security audits and penetration tests focusing on ML infrastructure can help identify similar weaknesses.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
@huntr_ai
Date Reserved
2025-12-30T21:47:03.954Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 69c6c6913c064ed76fdc294c

Added to database: 3/27/2026, 6:04:01 PM

Last enriched: 3/27/2026, 6:04:55 PM

Last updated: 3/28/2026, 1:56:22 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses