Impact
The vulnerability allows any network client to submit, read, search, and cancel jobs via FastAPI endpoints without authentication, bypassing basic‑auth and opening the possibility for unauthenticated remote code execution if allowed jobs perform privileged actions such as shell execution or filesystem changes. Even if jobs are deemed safe, the authentication bypass could enable job spam, denial of service, or exposure of job results.
Affected Systems
All installations of MLflow where the FastAPI job endpoints are active, particularly those using the latest repository version with basic‑auth enabled and where MLFLOW_SERVER_ENABLE_JOB_EXECUTION is set to true. Because specific version ranges are not provided, every current release is considered affected.
Risk and Exploitability
The CVSS score of 9.1 marks this issue as critical. Although EPSS data is unavailable, the lack of authentication on a publicly exposed API makes exploitation likely for reachable systems. The vulnerability is not listed in KEV, but the high impact and broad applicability mean that any network‑accessible MLflow deployment presents a substantial risk. Attackers can exploit the documented endpoints without credentials, potentially achieving remote code execution or other disruptive actions.
OpenCVE Enrichment