Description
MLflow Use of Default Password Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of MLflow. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the basic_auth.ini file. The file contains hard-coded default credentials. An attacker can leverage this vulnerability to bypass authentication and execute arbitrary code in the context of the administrator. Was ZDI-CAN-28256.
Published: 2026-02-20
Score: 9.8 Critical
EPSS: 1.1% Low
KEV: No
Impact: Authentication Bypass / Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The flaw resides in MLflow’s basic_auth.ini file where hard‑coded default credentials allow any user to authenticate as an administrator. Because no authentication is required to exploit the vulnerability, an attacker can log in immediately and execute arbitrary code with administrative privileges. The weakness is categorized as CWE-1393, reflecting the use of insecure, hard‑coded passwords in configuration files.

Affected Systems

The affected product is MLflow (MLflow:MLflow). No specific version information is listed in the CNA data, but the issue was addressed in a pull request (PR 19260) on GitHub and reported by the ZeroDay Initiative.

Risk and Exploitability

With a CVSS score of 9.8 the vulnerability is considered critical. The EPSS score of 1% indicates low current exploitation probability, yet the absence of authentication requirements makes exploitation trivially simple once a network path is available. The vulnerability is not listed in the CISA KEV catalog, but the potential for complete system compromise warrants immediate attention. Attackers can target any MLflow deployment exposed to the network without needing prior access to credentials or privileged accounts.

Generated by OpenCVE AI on April 17, 2026 at 17:01 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade MLflow to the latest release that incorporates the fix from pull request 19260.
  • If an immediate upgrade is not possible, delete or disable the basic_auth.ini file and enable a secure authentication plugin, ensuring that the installation does not contain hard‑coded credentials.
  • Configure file system permissions so that only privileged users can read configuration files and enforce a strong, unique administrator password.

Generated by OpenCVE AI on April 17, 2026 at 17:01 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-gq3w-7jj3-x7gr MLflow Use of Default Password Authentication Bypass Vulnerability
History

Tue, 24 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Mlflow
Mlflow mlflow
Vendors & Products Mlflow
Mlflow mlflow

Fri, 20 Feb 2026 22:45:00 +0000

Type Values Removed Values Added
Description MLflow Use of Default Password Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of MLflow. Authentication is not required to exploit this vulnerability. The specific flaw exists within the basic_auth.ini file. The file contains hard-coded default credentials. An attacker can leverage this vulnerability to bypass authentication and execute arbitrary code in the context of the administrator. Was ZDI-CAN-28256.
Title MLflow Use of Default Password Authentication Bypass Vulnerability
Weaknesses CWE-1393
References
Metrics cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published:

Updated: 2026-02-27T04:55:48.854Z

Reserved: 2026-02-17T18:43:46.629Z

Link: CVE-2026-2635

cve-icon Vulnrichment

Updated: 2026-02-24T15:17:34.505Z

cve-icon NVD

Status : Deferred

Published: 2026-02-20T23:16:05.577

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-2635

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T17:15:23Z

Weaknesses