Ad

CVE-2025-15381

HIGH CVSS 3.0: 8.1 EPSS 0.01%
Updated Mar 30, 2026
In
Parameter Value
CVSS 8.1 (HIGH)
Type CWE-200 (Information Exposure)
Vendor In
Public PoC No

In the latest version of mlflow/mlflow, when the `basic-auth` app is enabled, tracing and assessment endpoints are not protected by permission validators. This allows any authenticated user, including those with `NO_PERMISSIONS` on the experiment, to read trace information and create assessments for traces they should not have access to. This vulnerability impacts confidentiality by exposing trace metadata and integrity by allowing unauthorized creation of assessments.

Deployments using `mlflow server --app-name=basic-auth` are affected.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Privileges Required
Low
Basic privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
High
Complete data modification
Availability
None
No disruption

CVSS Vector v3.0

Weakness Type (CWE)