Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 30 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 30 Mar 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mlflow
Mlflow mlflow/mlflow |
|
| Vendors & Products |
Mlflow
Mlflow mlflow/mlflow |
Mon, 30 Mar 2026 03:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A path traversal vulnerability exists in the `extract_archive_to_dir` function within the `mlflow/pyfunc/dbconnect_artifact_cache.py` file of the mlflow/mlflow repository. This vulnerability, present in versions before v3.7.0, arises due to the lack of validation of tar member paths during extraction. An attacker with control over the tar.gz file can exploit this issue to overwrite arbitrary files or gain elevated privileges, potentially escaping the sandbox directory in multi-tenant or shared cluster environments. | |
| Title | Path Traversal Vulnerability in mlflow/mlflow | |
| Weaknesses | CWE-29 | |
| References |
| |
| Metrics |
cvssV3_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2026-03-30T14:01:12.722Z
Reserved: 2025-12-23T01:57:43.568Z
Link: CVE-2025-15036
Updated: 2026-03-30T14:01:09.340Z
Status : Awaiting Analysis
Published: 2026-03-30T02:16:14.413
Modified: 2026-03-30T13:26:07.647
Link: CVE-2025-15036
No data.
OpenCVE Enrichment
Updated: 2026-03-30T07:03:45Z