Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 27 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 27 Mar 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In the latest version of mlflow/mlflow, when the `basic-auth` app is enabled, tracing and assessment endpoints are not protected by permission validators. This allows any authenticated user, including those with `NO_PERMISSIONS` on the experiment, to read trace information and create assessments for traces they should not have access to. This vulnerability impacts confidentiality by exposing trace metadata and integrity by allowing unauthorized creation of assessments. Deployments using `mlflow server --app-name=basic-auth` are affected. | |
| Title | Unauthorized Access to Tracing and Assessment Endpoints in mlflow/mlflow | |
| Weaknesses | CWE-200 | |
| References |
| |
| Metrics |
cvssV3_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2026-03-27T17:00:57.831Z
Reserved: 2025-12-30T21:47:03.954Z
Link: CVE-2025-15381
Updated: 2026-03-27T16:59:04.315Z
Status : Received
Published: 2026-03-27T17:16:26.573
Modified: 2026-03-27T17:16:26.573
Link: CVE-2025-15381
No data.
OpenCVE Enrichment
Updated: 2026-03-27T20:28:07Z