PyPI: mlflow

CVE-2025-15379

Safety vulnerability ID: SFTY-20260330-50777

A command injection vulnerability exists in MLflow's model serving container initialization code, specifically in the `_install_model_dependencies_to_env()` function. When deploying a model with `env_manager=LOCAL`, MLflow reads dependency specifications from the model artifact's `python_env.yaml` file and directly interpolates them into a shell command without sanitization. This allows an attacker to supply a malicious model artifact and achieve arbitrary command execution on systems that deploy the model. The vulnerability affects versions 3.8.0 and is fixed in version 3.8.1.

Created at: Apr 28, 2026Updated at: Apr 28, 2026

Overview

MLflow Command Injection vulnerability

Advisory

MLflow Command Injection vulnerability

Affected Package

Affecting mlflow package, versions
< 3.8.1

Also affects

---

How to Fix

Upgrade
mlflow
to
3.8.1
or higher.

Mitigation and Workarounds

---

Vulnerable Functions

Functions linked to known vulnerabilities.

Vulnerable function data is available for Enterprise customers

Book a call with us to see Safety in action.

Safety

Verified by Safety

Our Cybersecurity Intelligence Team reviewed this vulnerability. We combine public data with our own research to find issues not yet reported to public sources.

Learn more