CVE-2025-15036
A path traversal vulnerability in the mlflow/mlflow repository allows attackers to overwrite arbitrary files or gain elevated privileges by exploiting the lack of validation of tar member paths during extraction. This issue affects versions before v3.7.0 and can be triggered by an attacker with control over the tar.gz file. The vulnerability can lead to escaping the sandbox directory in multi-tenant or shared cluster environments.
Developers and users of the mlflow/mlflow repository with versions before v3.7.0 are at risk of arbitrary file overwrites and elevated privileges, posing a critical security threat.
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
0
Affected Products
2
References
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Exploitability
Impact