Логотип exploitDog
bind:CVE-2025-14279
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-14279

Количество 2

Количество 2

nvd логотип

CVE-2025-14279

28 дней назад

MLFlow versions up to and including 3.4.0 are vulnerable to DNS rebinding attacks due to a lack of Origin header validation in the MLFlow REST server. This vulnerability allows malicious websites to bypass Same-Origin Policy protections and execute unauthorized calls against REST endpoints. An attacker can query, update, and delete experiments via the affected endpoints, leading to potential data exfiltration, destruction, or manipulation. The issue is resolved in version 3.5.0.

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-pgqp-8h46-6x4j

28 дней назад

MLFlow is vulnerable to DNS rebinding attacks due to a lack of Origin header validation

CVSS3: 8.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-14279

MLFlow versions up to and including 3.4.0 are vulnerable to DNS rebinding attacks due to a lack of Origin header validation in the MLFlow REST server. This vulnerability allows malicious websites to bypass Same-Origin Policy protections and execute unauthorized calls against REST endpoints. An attacker can query, update, and delete experiments via the affected endpoints, leading to potential data exfiltration, destruction, or manipulation. The issue is resolved in version 3.5.0.

CVSS3: 8.1
0%
Низкий
28 дней назад
github логотип
GHSA-pgqp-8h46-6x4j

MLFlow is vulnerable to DNS rebinding attacks due to a lack of Origin header validation

CVSS3: 8.1
0%
Низкий
28 дней назад

Уязвимостей на страницу