A vulnerability in MLflow's pyfunc extraction process allows for arbitrary file writes due to improper handling of tar archive entries. Specifically, the use of `tarfile.extractall` without path validation enables crafted tar.gz files containing `..` or absolute paths to escape the intended extraction directory. This issue affects the latest version of MLflow and poses a high/critical risk in scenarios involving multi-tenant environments or ingestion of untrusted artifacts, as it can lead to arbitrary file overwrites and potential remote code execution.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 18 Mar 2026 22:30:00 +0000

Type Values Removed Values Added
Description A vulnerability in MLflow's pyfunc extraction process allows for arbitrary file writes due to improper handling of tar archive entries. Specifically, the use of `tarfile.extractall` without path validation enables crafted tar.gz files containing `..` or absolute paths to escape the intended extraction directory. This issue affects the latest version of MLflow and poses a high/critical risk in scenarios involving multi-tenant environments or ingestion of untrusted artifacts, as it can lead to arbitrary file overwrites and potential remote code execution.
Title Path Traversal Vulnerability in mlflow/mlflow
Weaknesses CWE-22
References
Metrics cvssV3_0

{'score': 8.1, 'vector': 'CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published:

Updated: 2026-03-18T22:06:47.300Z

Reserved: 2025-12-22T14:49:46.957Z

Link: CVE-2025-15031

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-18T23:17:28.693

Modified: 2026-03-18T23:17:28.693

Link: CVE-2025-15031

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses