Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pgqp-8h46-6x4j

Опубликовано: 12 янв. 2026
Источник: github
Github: Прошло ревью
CVSS3: 8.1

Описание

MLFlow is vulnerable to DNS rebinding attacks due to a lack of Origin header validation

MLFlow versions up to and including 3.4.0 are vulnerable to DNS rebinding attacks due to a lack of Origin header validation in the MLFlow REST server. This vulnerability allows malicious websites to bypass Same-Origin Policy protections and execute unauthorized calls against REST endpoints. An attacker can query, update, and delete experiments via the affected endpoints, leading to potential data exfiltration, destruction, or manipulation. The issue is resolved in version 3.5.0.

Пакеты

Наименование

mlflow

pip
Затронутые версииВерсия исправления

< 3.5.0

3.5.0

EPSS

Процентиль: 4%
0.00018
Низкий

8.1 High

CVSS3

Дефекты

CWE-346

Связанные уязвимости

CVSS3: 8.1
nvd
26 дней назад

MLFlow versions up to and including 3.4.0 are vulnerable to DNS rebinding attacks due to a lack of Origin header validation in the MLFlow REST server. This vulnerability allows malicious websites to bypass Same-Origin Policy protections and execute unauthorized calls against REST endpoints. An attacker can query, update, and delete experiments via the affected endpoints, leading to potential data exfiltration, destruction, or manipulation. The issue is resolved in version 3.5.0.

EPSS

Процентиль: 4%
0.00018
Низкий

8.1 High

CVSS3

Дефекты

CWE-346