PyPI: mlflow

CVE-2026-2393

Safety vulnerability ID: SFTY-20260511-46276

A Server-Side Request Forgery (SSRF) vulnerability exists in MLflow versions prior to 3.9.0. The `_create_webhook()` function in `mlflow/server/handlers.py` accepts a user-controlled `url` parameter without validation, and the `_send_webhook_request()` function in `mlflow/webhooks/delivery.py` sends HTTP POST requests to this attacker-controlled URL. This allows an authenticated attacker to force the MLflow backend to send HTTP requests to internal services, cloud metadata endpoints, or arbitrary external servers. The lack of input sanitization, URL scheme filtering, or allowlist validation on the webhook URL enables exploitation, potentially leading to cloud credential theft, internal network access, and data exfiltration.

Created at: May 22, 2026Updated at: May 22, 2026

Overview

MLflow Has a Server-Side Request Forgery (SSRF) Vulnerability

Advisory

MLflow Has a Server-Side Request Forgery (SSRF) Vulnerability

Affected Package

Affecting mlflow package, versions
< 3.9.0

Also affects

---

How to Fix

Upgrade
mlflow
to
3.9.0
or higher.

Mitigation and Workarounds

---

Vulnerable Functions

Functions linked to known vulnerabilities.

Vulnerable function data is available for Enterprise customers

Book a call with us to see Safety in action.

Safety

Verified by Safety

Our Cybersecurity Intelligence Team reviewed this vulnerability. We combine public data with our own research to find issues not yet reported to public sources.

Learn more