NVD - CVE-2025-11201

1 min read Original article ↗

Initial Analysis by NIST 11/04/2025 4:22:41 PM

Action Type Old Value New Value
Added CVSS V3.1
AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Added CPE Configuration
OR
          *cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:* versions up to (excluding) 2025-06-10
Added Reference Type
Zero Day Initiative: https://github.com/B-Step62/mlflow/commit/2e02bc7bb70df243e6eb792689d9b8eba0013161 Types: Patch
Added Reference Type
Zero Day Initiative: https://www.zerodayinitiative.com/advisories/ZDI-25-931/ Types: Third Party Advisory

New CVE Received from Zero Day Initiative 10/29/2025 4:15:35 PM

Action Type Old Value New Value
Added Description
MLflow Tracking Server Model Creation Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of MLflow Tracking Server. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the handling of model file paths. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-26921.
Added CVSS V3
AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Added CWE
CWE-22
Added Reference
https://github.com/B-Step62/mlflow/commit/2e02bc7bb70df243e6eb792689d9b8eba0013161
Added Reference
https://www.zerodayinitiative.com/advisories/ZDI-25-931/