PyPI: mlflow

CVE-2025-15036

Safety vulnerability ID: SFTY-20260330-90105

A path traversal vulnerability exists in the `extract_archive_to_dir` function within the `mlflow/pyfunc/dbconnect_artifact_cache.py` file of the mlflow/mlflow repository. This vulnerability, present in versions before v3.7.0, arises due to the lack of validation of tar member paths during extraction. An attacker with control over the tar.gz file can exploit this issue to overwrite arbitrary files or gain elevated privileges, potentially escaping the sandbox directory in multi-tenant or shared cluster environments.

Created at: Apr 28, 2026Updated at: Apr 28, 2026

Overview

MLFlow path traversal vulnerability

Advisory

MLFlow path traversal vulnerability

Affected Package

Affecting mlflow package, versions
< 3.9.0rc0

Also affects

---

How to Fix

Upgrade
mlflow
to
3.9.0rc0
or higher.

Mitigation and Workarounds

---

Vulnerable Functions

Functions linked to known vulnerabilities.

Vulnerable function data is available for Enterprise customers

Book a call with us to see Safety in action.

Safety

Verified by Safety

Our Cybersecurity Intelligence Team reviewed this vulnerability. We combine public data with our own research to find issues not yet reported to public sources.

Learn more