Skip to content

Commit 72e003e

Browse files
1 parent ff210b0 commit 72e003e

1 file changed

Lines changed: 27 additions & 2 deletions

File tree

advisories/unreviewed/2026/03/GHSA-rvhj-8chj-8v3c/GHSA-rvhj-8chj-8v3c.json

Lines changed: 27 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,49 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-rvhj-8chj-8v3c",
4-
"modified": "2026-03-31T15:31:56Z",
4+
"modified": "2026-03-31T15:32:03Z",
55
"published": "2026-03-31T15:31:56Z",
66
"aliases": [
77
"CVE-2026-0596"
88
],
9+
"summary": "Command injection in mlflow when serving models with enable_mlserver=True",
910
"details": "A command injection vulnerability exists in mlflow/mlflow when serving a model with `enable_mlserver=True`. The `model_uri` is embedded directly into a shell command executed via `bash -c` without proper sanitization. If the `model_uri` contains shell metacharacters, such as `$()` or backticks, it allows for command substitution and execution of attacker-controlled commands. This vulnerability affects the latest version of mlflow/mlflow and can lead to privilege escalation if a higher-privileged service serves models from a directory writable by lower-privileged users.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "PyPI",
21+
"name": "mlflow"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"last_affected": "3.1.4"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
2041
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-0596"
2142
},
43+
{
44+
"type": "PACKAGE",
45+
"url": "https://github.com/mlflow/mlflow"
46+
},
2247
{
2348
"type": "WEB",
2449
"url": "https://huntr.com/bounties/2e905add-f9f5-4309-a3db-b17de5981285"

0 commit comments

Comments
 (0)