PyPI: mlflow

CVE-2025-15381

Safety vulnerability ID: SFTY-20260327-54769

In the latest version of mlflow/mlflow, when the `basic-auth` app is enabled, tracing and assessment endpoints are not protected by permission validators. This allows any authenticated user, including those with `NO_PERMISSIONS` on the experiment, to read trace information and create assessments for traces they should not have access to. This vulnerability impacts confidentiality by exposing trace metadata and integrity by allowing unauthorized creation of assessments. Deployments using `mlflow server --app-name=basic-auth` are affected.

Created at: Apr 28, 2026Updated at: Apr 28, 2026

Overview

MLFlow allows Tracing + Assessments Access

Advisory

MLFlow allows Tracing + Assessments Access

Affected Package

Affecting mlflow package, versions
<= 3.8.1

Also affects

---

How to Fix

We recommend updating mlflow to the latest non-vulnerable version.

Mitigation and Workarounds

---

Vulnerable Functions

Functions linked to known vulnerabilities.

Vulnerable function data is available for Enterprise customers

Book a call with us to see Safety in action.

Safety

Verified by Safety

Our Cybersecurity Intelligence Team reviewed this vulnerability. We combine public data with our own research to find issues not yet reported to public sources.

Learn more