Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2652: CWE-305 Authentication Bypass by Primary Weakness in mlflow mlflow/mlflow

0
High
VulnerabilityCVE-2026-2652cvecve-2026-2652cwe-305
Published: Fri May 15 2026 (05/15/2026, 02:13:19 UTC)
Source: CVE Database V5
Vendor/Project: mlflow
Product: mlflow/mlflow

Description

CVE-2026-2652 is a high-severity authentication bypass vulnerability in mlflow/mlflow versions 3. 9. 0 and earlier. When the server is started with basic authentication enabled and served via uvicorn, certain FastAPI routes outside the /gateway/ path are not protected by authentication middleware. This allows unauthenticated remote attackers to submit jobs, read job results, cancel running jobs, and inject arbitrary trace data. The root cause is a mismatch between Flask and FastAPI authentication handling, where the validator function does not cover non-/gateway/ routes. This issue is fixed in version 3. 10. 0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 05/15/2026, 03:21:41 UTC

Technical Analysis

The vulnerability in mlflow/mlflow (<=3.9.0) arises because the FastAPI permission middleware enforces authentication only on /gateway/ routes, leaving other routes such as /ajax-api/3.0/jobs/* and /v1/traces unprotected when basic authentication is enabled. This architectural mismatch between Flask and FastAPI authentication mechanisms causes the _find_fastapi_validator() function to bypass authentication checks on these routes. As a result, unauthenticated attackers can remotely perform sensitive actions including job submission, job result retrieval, job cancellation, and injection of arbitrary trace data into experiments. The vulnerability is addressed in mlflow version 3.10.0.

Potential Impact

The vulnerability allows unauthenticated remote attackers to bypass authentication controls and interact with critical API endpoints. Attackers can submit jobs, access job results, cancel running jobs, and inject arbitrary telemetry data, potentially compromising the integrity and confidentiality of experiment data and workflows. The CVSS score of 8.6 reflects a high impact with low attack complexity and no required privileges or user interaction.

Mitigation Recommendations

This vulnerability is fixed in mlflow version 3.10.0. Users should upgrade to version 3.10.0 or later to remediate this issue. Since no official patch link or advisory is provided, verify the upgrade availability from the official mlflow project resources. Until upgraded, restrict access to the affected API endpoints through network controls or disable the affected routes if possible. Patch status is not yet confirmed via vendor advisory; check official mlflow channels for the latest remediation guidance.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
@huntr_ai
Date Reserved
2026-02-18T02:53:33.607Z
Cvss Version
3.0
State
PUBLISHED
Remediation Level
null

Threat ID: 6a068dc1ec166c07b09aca03

Added to database: 5/15/2026, 3:06:41 AM

Last enriched: 5/15/2026, 3:21:41 AM

Last updated: 5/15/2026, 4:10:37 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses