Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-2614— Arbitrary File Read via Prompt Tag Source Validation Bypass in mlflow/mlflow

AI Predicted 9.8 Difficulty: Easy EPSS 0.04% · P12

Affected Version Matrix 1

VendorProductVersion RangeStatus
mlflowmlflow/mlflowunspecified< 3.10.0affected
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-2614

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Arbitrary File Read via Prompt Tag Source Validation Bypass in mlflow/mlflow
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability in the `_create_model_version()` handler of `mlflow/server/handlers.py` in mlflow/mlflow versions 3.9.0 and earlier allows an unauthenticated remote attacker to read arbitrary files from the server's filesystem. The issue arises when a `CreateModelVersion` request includes the tag `mlflow.prompt.is_prompt`, which bypasses source path validation. This enables an attacker to store an arbitrary local filesystem path as the model version source. The `get_model_version_artifact_handler()` function later uses this source to serve files without verifying the model version's prompt status, leading to a complete confidentiality compromise. This issue is fixed in version 3.10.0.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
对路径名的限制不恰当(路径遍历)
Source: NVD (National Vulnerability Database)
Vulnerability Title
MLflow 路径遍历漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
MLflow是MLflow开源的一个简化机器学习开发的平台,包括跟踪实验、将代码打包成可重复的运行以及共享和部署模型。 MLflow 3.9.0及之前版本存在路径遍历漏洞,该漏洞源于_create_model_version处理程序在CreateModelVersion请求包含mlflow.prompt.is_prompt标签时绕过源路径验证,允许未经身份验证的远程攻击者从服务器文件系统读取任意文件,导致机密性完全泄露。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
mlflowmlflow/mlflow unspecified ~ 3.10.0 -

II. Public POCs for CVE-2026-2614

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-2614

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2026-2614

No comments yet


Leave a comment