CVE-2025-11201
BaseFortify
Publication date: 2025-10-29
Last updated on: 2025-11-04
Assigner: Zero Day Initiative
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| lfprojects | mlflow | to 2025-06-10 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a directory traversal remote code execution flaw in the MLflow Tracking Server. It occurs because the server does not properly validate user-supplied model file paths before using them in file operations. This allows remote attackers to execute arbitrary code on the server without needing authentication.
How can this vulnerability impact me? :
An attacker can exploit this vulnerability to execute arbitrary code on the MLflow Tracking Server with the privileges of the service account. This can lead to full compromise of the server, unauthorized access to data, disruption of services, and potential spread of malware within the affected environment.