PyPI: mlflow

CVE-2026-0545

Safety vulnerability ID: SFTY-20260403-85111

Safety legacy ID: pyup.io-93829

Affected versions of the mlflow package are vulnerable to Missing Authentication due to the FastAPI job endpoints mounted under /ajax-api/3.0/jobs/* not enforcing authentication or authorization when the basic-auth app is enabled. When job execution is enabled via MLFLOW_SERVER_ENABLE_JOB_EXECUTION=true and at least one job function is allowlisted, the /ajax-api/3.0/jobs/* routes bypass basic-auth entirely, accepting submit, read, search, and cancel operations from any network client without credentials. An unauthenticated remote attacker can invoke allowlisted jobs, which may yield remote code execution when a job performs privileged actions such as shell execution or filesystem changes, and otherwise enables job spam, Denial of Service, and disclosure of job result data.

Created at: Apr 21, 2026Updated at: Apr 21, 2026

Overview

mlflow: FastAPI job endpoints under `/ajax-api/3.0/jobs/*` are not protected by authentication or authorization

Advisory

Affected versions of the mlflow package are vulnerable to Missing Authentication due to the FastAPI job endpoints mounted under /ajax-api/3.0/jobs/* not enforcing authentication or authorization when the basic-auth app is enabled. When job execution is enabled via MLFLOW_SERVER_ENABLE_JOB_EXECUTION=true and at least one job function is allowlisted, the /ajax-api/3.0/jobs/* routes bypass basic-auth entirely, accepting submit, read, search, and cancel operations from any network client without credentials. An unauthenticated remote attacker can invoke allowlisted jobs, which may yield remote code execution when a job performs privileged actions such as shell execution or filesystem changes, and otherwise enables job spam, Denial of Service, and disclosure of job result data.

Affected Package

Affecting mlflow package, versions
<=3.10.1

Also affects

---

How to Fix

Upgrade
mlflow
to
3.11.0rc0
or higher.

Mitigation and Workarounds

---

Vulnerable Functions

Functions linked to known vulnerabilities.

Vulnerable function data is available for Enterprise customers

Book a call with us to see Safety in action.

Safety

Verified by Safety

Our Cybersecurity Intelligence Team reviewed this vulnerability. We combine public data with our own research to find issues not yet reported to public sources.

Learn more