CVE-2024-27133 – mlflow
Package
Manager: pip
Name: mlflow
Vulnerable Version: >=0 <2.10.0
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
EPSS: 0.00288 pctl0.51845
Details
MLFlow Cross-site Scripting vulnerability leads to client-side Remote Code Execution Insufficient sanitization in MLflow leads to XSS when running a recipe that uses an untrusted dataset. This issue leads to a client-side RCE when running the recipe in Jupyter Notebook. The vulnerability stems from lack of sanitization over dataset table fields.
Metadata
Created: 2024-02-24T00:30:20Z
Modified: 2025-04-08T21:59:06Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/02/GHSA-3v79-q7ph-j75h/GHSA-3v79-q7ph-j75h.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-3v79-q7ph-j75h
Finding: F425
Auto approve: 1