PyPI: mlflow

CVE-2026-0596

Safety vulnerability ID: SFTY-20260331-13445

A command injection vulnerability exists in Mlflow when serving a model with `enable_mlserver=True`. The `model_uri` is embedded directly into a shell command executed via `bash -c` without proper sanitization. If the `model_uri` contains shell metacharacters, such as `$()` or backticks, it allows for command substitution and execution of attacker-controlled commands. This vulnerability affects the latest version of mlflow/mlflow and can lead to privilege escalation if a higher-privileged service serves models from a directory writable by lower-privileged users.

Created at: May 20, 2026Updated at: May 20, 2026

Overview

Mlflow: Command Injection when serving models with enable_mlserver=True

Advisory

Mlflow: Command Injection when serving models with enable_mlserver=True

Affected Package

Affecting mlflow package, versions
< 3.9.0

Also affects

---

How to Fix

Upgrade
mlflow
to
3.9.0
or higher.

Mitigation and Workarounds

---

Vulnerable Functions

Functions linked to known vulnerabilities.

Vulnerable function data is available for Enterprise customers

Book a call with us to see Safety in action.

Safety

Verified by Safety

Our Cybersecurity Intelligence Team reviewed this vulnerability. We combine public data with our own research to find issues not yet reported to public sources.

Learn more