Логотип exploitDog
bind:CVE-2025-11201
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-11201

Количество 2

Количество 2

nvd логотип

CVE-2025-11201

3 месяца назад

MLflow Tracking Server Model Creation Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of MLflow Tracking Server. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of model file paths. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-26921.

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-5cvj-7rg6-jggj

3 месяца назад

MLflow Tracking Server Model Creation Directory Traversal Remote Code Execution Vulnerability

CVSS3: 8.1
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-11201

MLflow Tracking Server Model Creation Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of MLflow Tracking Server. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of model file paths. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-26921.

CVSS3: 9.8
19%
Средний
3 месяца назад
github логотип
GHSA-5cvj-7rg6-jggj

MLflow Tracking Server Model Creation Directory Traversal Remote Code Execution Vulnerability

CVSS3: 8.1
19%
Средний
3 месяца назад

Уязвимостей на страницу