Description
In mlflow/mlflow, the FastAPI job endpoints under `/ajax-api/3.0/jobs/*` are not protected by authentication or authorization when the `basic-auth` app is enabled. This vulnerability affects the latest version of the repository. If job execution is enabled (`MLFLOW_SERVER_ENABLE_JOB_EXECUTION=true`) and any job function is allowlisted, any network client can submit, read, search, and cancel jobs without credentials, bypassing basic-auth entirely. This can lead to unauthenticated remote code execution if allowed jobs perform privileged actions such as shell execution or filesystem changes. Even if jobs are deemed safe, this still constitutes an authentication bypass, potentially resulting in job spam, denial of service (DoS), or data exposure in job results.
Published: 2026-04-03
Score: 9.1 Critical
EPSS: n/a
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability allows any network client to submit, read, search, and cancel jobs via FastAPI endpoints without authentication, bypassing basic‑auth and opening the possibility for unauthenticated remote code execution if allowed jobs perform privileged actions such as shell execution or filesystem changes. Even if jobs are deemed safe, the authentication bypass could enable job spam, denial of service, or exposure of job results.

Affected Systems

All installations of MLflow where the FastAPI job endpoints are active, particularly those using the latest repository version with basic‑auth enabled and where MLFLOW_SERVER_ENABLE_JOB_EXECUTION is set to true. Because specific version ranges are not provided, every current release is considered affected.

Risk and Exploitability

The CVSS score of 9.1 marks this issue as critical. Although EPSS data is unavailable, the lack of authentication on a publicly exposed API makes exploitation likely for reachable systems. The vulnerability is not listed in KEV, but the high impact and broad applicability mean that any network‑accessible MLflow deployment presents a substantial risk. Attackers can exploit the documented endpoints without credentials, potentially achieving remote code execution or other disruptive actions.

Generated by OpenCVE AI on April 3, 2026 at 20:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update MLflow to the latest version that enforces authentication on job endpoints
  • If an update is not immediately possible, disable job execution by setting MLFLOW_SERVER_ENABLE_JOB_EXECUTION to false
  • Restrict the job allowlist to only trusted functions and eliminate any that perform privileged actions
  • Ensure that basic authentication is not simultaneously enabled with job execution unless proper authorization controls are in place

Generated by OpenCVE AI on April 3, 2026 at 20:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Mlflow
Mlflow mlflow
Vendors & Products Mlflow
Mlflow mlflow

Fri, 03 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 03 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
Description In mlflow/mlflow, the FastAPI job endpoints under `/ajax-api/3.0/jobs/*` are not protected by authentication or authorization when the `basic-auth` app is enabled. This vulnerability affects the latest version of the repository. If job execution is enabled (`MLFLOW_SERVER_ENABLE_JOB_EXECUTION=true`) and any job function is allowlisted, any network client can submit, read, search, and cancel jobs without credentials, bypassing basic-auth entirely. This can lead to unauthenticated remote code execution if allowed jobs perform privileged actions such as shell execution or filesystem changes. Even if jobs are deemed safe, this still constitutes an authentication bypass, potentially resulting in job spam, denial of service (DoS), or data exposure in job results.
Title Missing Authentication for Critical Function in mlflow/mlflow
Weaknesses CWE-306
References
Metrics cvssV3_0

{'score': 9.1, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published:

Updated: 2026-04-03T17:49:22.749Z

Reserved: 2026-01-01T09:52:49.217Z

Link: CVE-2026-0545

cve-icon Vulnrichment

Updated: 2026-04-03T17:49:13.495Z

cve-icon NVD

Status : Received

Published: 2026-04-03T18:16:21.540

Modified: 2026-04-03T18:16:21.540

Link: CVE-2026-0545

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T21:15:04Z

Weaknesses