Description
A vulnerability in the `_create_model_version()` handler of `mlflow/server/handlers.py` in mlflow/mlflow versions 3.9.0 and earlier allows an unauthenticated remote attacker to read arbitrary files from the server's filesystem. The issue arises when a `CreateModelVersion` request includes the tag `mlflow.prompt.is_prompt`, which bypasses source path validation. This enables an attacker to store an arbitrary local filesystem path as the model version source. The `get_model_version_artifact_handler()` function later uses this source to serve files without verifying the model version's prompt status, leading to a complete confidentiality compromise. This issue is fixed in version 3.10.0.
Published: 2026-05-11
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A flaw in the _create_model_version() handler of the mlflow server allows an unauthenticated remote attacker to read any file on the server. By including the tag mlflow.prompt.is_prompt in a CreateModelVersion request, the server stores a local filesystem path as the model source. Later, the get_model_version_artifact_handler() serves files from this unverified path, exposing arbitrary file contents and defeating confidentiality.

Affected Systems

This vulnerability affects mlflow versions 3.9.0 and earlier. The issue is fixed in 3.10.0 and later releases. Any deployment of the affected versions is potentially vulnerable.

Risk and Exploitability

The CVSS score of 7.5 indicates significant risk. No EPSS data is available, but the vulnerability is driverless and can be exploited by any actor able to send HTTP requests to the mlflow API. The issue is not listed in the CISA KEV catalog, yet the remote, unauthenticated nature of the attack and the direct reading of server files make it a strong candidate for active exploitation. The attack vector is inferred to rely on crafting a model creation request that bypasses source validation through the prompt tag, allowing direct file read without further authentication.

Generated by OpenCVE AI on May 11, 2026 at 21:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade mlflow to version 3.10.0 or later.
  • Disable or remove the mlflow.prompt.is_prompt tag in all CreateModelVersion requests until the patch is applied.
  • Enforce authentication and authorization on the CreateModelVersion endpoint to limit who can create models.

Generated by OpenCVE AI on May 11, 2026 at 21:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 11 May 2026 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Mlflow
Mlflow mlflow/mlflow
Vendors & Products Mlflow
Mlflow mlflow/mlflow

Mon, 11 May 2026 19:30:00 +0000

Type Values Removed Values Added
Description A vulnerability in the `_create_model_version()` handler of `mlflow/server/handlers.py` in mlflow/mlflow versions 3.9.0 and earlier allows an unauthenticated remote attacker to read arbitrary files from the server's filesystem. The issue arises when a `CreateModelVersion` request includes the tag `mlflow.prompt.is_prompt`, which bypasses source path validation. This enables an attacker to store an arbitrary local filesystem path as the model version source. The `get_model_version_artifact_handler()` function later uses this source to serve files without verifying the model version's prompt status, leading to a complete confidentiality compromise. This issue is fixed in version 3.10.0.
Title Arbitrary File Read via Prompt Tag Source Validation Bypass in mlflow/mlflow
Weaknesses CWE-22
References
Metrics cvssV3_0

{'score': 7.5, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Mlflow Mlflow/mlflow
cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published:

Updated: 2026-05-12T13:33:20.949Z

Reserved: 2026-02-17T06:46:27.686Z

Link: CVE-2026-2614

cve-icon Vulnrichment

Updated: 2026-05-12T13:33:09.196Z

cve-icon NVD

Status : Received

Published: 2026-05-11T20:25:41.423

Modified: 2026-05-12T14:17:01.260

Link: CVE-2026-2614

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-11T21:30:26Z

Weaknesses