CVE-2026-33865
Awaiting Analysis Awaiting Analysis - Queue
Stored XSS in MLflow YAML Parsing Enables Session Hijacking

Publication date: 2026-04-07

Last updated on: 2026-04-20

Assigner: CERT.PL

Description
MLflow is vulnerable to Stored Cross-Site Scripting (XSS) caused by unsafe parsing of YAML-based MLmodel artifacts in its web interface. An authenticated attacker can upload a malicious MLmodel file containing a payload that executes when another user views the artifact in the UI. This allows actions such as session hijacking or performing operations on behalf of the victim. This issue affects MLflow version through 3.10.1
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-07
Last Modified
2026-04-20
Generated
2026-05-07
AI Q&A
2026-04-07
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
lfprojects mlflow to 3.10.1 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-33865 is a Stored Cross-Site Scripting (XSS) vulnerability in MLflow versions up to 3.10.1. It occurs because MLflow's web interface unsafely parses YAML-based MLmodel artifact files. An authenticated attacker can upload a malicious MLmodel file containing a payload that executes JavaScript code when another user views the artifact in the UI.

This unsafe parsing happens due to the use of the `yaml.load()` function from the js-yaml library, which supports JavaScript-specific YAML tags that can be exploited to run arbitrary code. The vulnerability allows attackers to perform actions such as session hijacking or executing operations on behalf of the victim user.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing an authenticated attacker to execute malicious JavaScript code in your browser when you view a compromised MLmodel artifact in the MLflow UI.

  • Session hijacking, where the attacker can steal your session and impersonate you.
  • Performing unauthorized operations on your behalf within the MLflow application.

How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this vulnerability involves identifying whether your MLflow installation is running a vulnerable version (up to and including 3.10.1) and if malicious MLmodel YAML artifacts have been uploaded and viewed in the web interface.

Since the vulnerability is a stored Cross-Site Scripting (XSS) caused by unsafe YAML parsing in the MLflow web UI, detection can include:

  • Checking the MLflow version to confirm if it is 3.10.1 or earlier.
  • Reviewing uploaded MLmodel artifact files for suspicious YAML content, especially those containing JavaScript-specific YAML tags like !!js/function.
  • Monitoring web interface logs or user activity for unexpected script execution or unusual behavior when viewing MLmodel artifacts.

Specific commands are not provided in the available resources, but you can use commands to check the MLflow version, for example:

  • `mlflow --version`
  • To inspect MLmodel files, you can use standard file inspection commands such as `cat` or `less` on the artifact files stored in your MLflow artifact storage.
  • For searching suspicious YAML tags in MLmodel files, you might use grep commands like: `grep -r '!!js/function' /path/to/mlflow/artifacts`

What immediate steps should I take to mitigate this vulnerability?

The primary mitigation step is to upgrade MLflow to version 3.10.2 or later, where the vulnerability has been fixed by replacing unsafe YAML parsing (`yaml.load()`) with a safe alternative (`yaml.safeLoad()`).

Additional immediate steps include:

  • Restricting upload permissions to trusted authenticated users to prevent malicious MLmodel files from being uploaded.
  • Reviewing and removing any suspicious MLmodel artifacts that may contain malicious payloads.
  • Monitoring user activity and web interface logs for signs of exploitation.

Applying the patch or upgrade as soon as possible is the most effective way to eliminate the attack vector.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows an authenticated attacker to execute stored Cross-Site Scripting (XSS) attacks by uploading malicious MLmodel files that execute when viewed by other users. This can lead to session hijacking and unauthorized actions performed on behalf of victims.

Such unauthorized access and actions could potentially lead to breaches of confidentiality and integrity of user data, which may impact compliance with data protection regulations like GDPR and HIPAA that require safeguarding personal and sensitive information against unauthorized access and attacks.

However, the provided information does not explicitly discuss or analyze the direct impact of this vulnerability on compliance with specific standards or regulations.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart