CVE-2026-2652: CWE-305 Authentication Bypass by Primary Weakness in mlflow mlflow/mlflow
CVE-2026-2652 is a high-severity authentication bypass vulnerability in mlflow/mlflow versions 3. 9. 0 and earlier. When the server is started with basic authentication enabled and served via uvicorn, certain FastAPI routes outside the /gateway/ path are not protected by authentication middleware. This allows unauthenticated remote attackers to submit jobs, read job results, cancel running jobs, and inject arbitrary trace data. The root cause is a mismatch between Flask and FastAPI authentication handling, where the validator function does not cover non-/gateway/ routes. This issue is fixed in version 3. 10. 0.
AI Analysis
Technical Summary
The vulnerability in mlflow/mlflow (<=3.9.0) arises because the FastAPI permission middleware enforces authentication only on /gateway/ routes, leaving other routes such as /ajax-api/3.0/jobs/* and /v1/traces unprotected when basic authentication is enabled. This architectural mismatch between Flask and FastAPI authentication mechanisms causes the _find_fastapi_validator() function to bypass authentication checks on these routes. As a result, unauthenticated attackers can remotely perform sensitive actions including job submission, job result retrieval, job cancellation, and injection of arbitrary trace data into experiments. The vulnerability is addressed in mlflow version 3.10.0.
Potential Impact
The vulnerability allows unauthenticated remote attackers to bypass authentication controls and interact with critical API endpoints. Attackers can submit jobs, access job results, cancel running jobs, and inject arbitrary telemetry data, potentially compromising the integrity and confidentiality of experiment data and workflows. The CVSS score of 8.6 reflects a high impact with low attack complexity and no required privileges or user interaction.
Mitigation Recommendations
This vulnerability is fixed in mlflow version 3.10.0. Users should upgrade to version 3.10.0 or later to remediate this issue. Since no official patch link or advisory is provided, verify the upgrade availability from the official mlflow project resources. Until upgraded, restrict access to the affected API endpoints through network controls or disable the affected routes if possible. Patch status is not yet confirmed via vendor advisory; check official mlflow channels for the latest remediation guidance.
CVE-2026-2652: CWE-305 Authentication Bypass by Primary Weakness in mlflow mlflow/mlflow
Description
CVE-2026-2652 is a high-severity authentication bypass vulnerability in mlflow/mlflow versions 3. 9. 0 and earlier. When the server is started with basic authentication enabled and served via uvicorn, certain FastAPI routes outside the /gateway/ path are not protected by authentication middleware. This allows unauthenticated remote attackers to submit jobs, read job results, cancel running jobs, and inject arbitrary trace data. The root cause is a mismatch between Flask and FastAPI authentication handling, where the validator function does not cover non-/gateway/ routes. This issue is fixed in version 3. 10. 0.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability in mlflow/mlflow (<=3.9.0) arises because the FastAPI permission middleware enforces authentication only on /gateway/ routes, leaving other routes such as /ajax-api/3.0/jobs/* and /v1/traces unprotected when basic authentication is enabled. This architectural mismatch between Flask and FastAPI authentication mechanisms causes the _find_fastapi_validator() function to bypass authentication checks on these routes. As a result, unauthenticated attackers can remotely perform sensitive actions including job submission, job result retrieval, job cancellation, and injection of arbitrary trace data into experiments. The vulnerability is addressed in mlflow version 3.10.0.
Potential Impact
The vulnerability allows unauthenticated remote attackers to bypass authentication controls and interact with critical API endpoints. Attackers can submit jobs, access job results, cancel running jobs, and inject arbitrary telemetry data, potentially compromising the integrity and confidentiality of experiment data and workflows. The CVSS score of 8.6 reflects a high impact with low attack complexity and no required privileges or user interaction.
Mitigation Recommendations
This vulnerability is fixed in mlflow version 3.10.0. Users should upgrade to version 3.10.0 or later to remediate this issue. Since no official patch link or advisory is provided, verify the upgrade availability from the official mlflow project resources. Until upgraded, restrict access to the affected API endpoints through network controls or disable the affected routes if possible. Patch status is not yet confirmed via vendor advisory; check official mlflow channels for the latest remediation guidance.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- @huntr_ai
- Date Reserved
- 2026-02-18T02:53:33.607Z
- Cvss Version
- 3.0
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 6a068dc1ec166c07b09aca03
Added to database: 5/15/2026, 3:06:41 AM
Last enriched: 5/15/2026, 3:21:41 AM
Last updated: 5/15/2026, 4:10:37 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.