Impact
The flaw resides in MLflow’s basic_auth.ini file where hard‑coded default credentials allow any user to authenticate as an administrator. Because no authentication is required to exploit the vulnerability, an attacker can log in immediately and execute arbitrary code with administrative privileges. The weakness is categorized as CWE-1393, reflecting the use of insecure, hard‑coded passwords in configuration files.
Affected Systems
The affected product is MLflow (MLflow:MLflow). No specific version information is listed in the CNA data, but the issue was addressed in a pull request (PR 19260) on GitHub and reported by the ZeroDay Initiative.
Risk and Exploitability
With a CVSS score of 9.8 the vulnerability is considered critical. The EPSS score of 1% indicates low current exploitation probability, yet the absence of authentication requirements makes exploitation trivially simple once a network path is available. The vulnerability is not listed in the CISA KEV catalog, but the potential for complete system compromise warrants immediate attention. Attackers can target any MLflow deployment exposed to the network without needing prior access to credentials or privileged accounts.
OpenCVE Enrichment
Github GHSA