Home

Description

A command injection vulnerability exists in mlflow/mlflow versions before v3.7.0, specifically in the `mlflow/sagemaker/__init__.py` file at lines 161-167. The vulnerability arises from the direct interpolation of user-supplied container image names into shell commands without proper sanitization, which are then executed using `os.system()`. This allows attackers to execute arbitrary commands by supplying malicious input through the `--container` parameter of the CLI. The issue affects environments where MLflow is used, including development setups, CI/CD pipelines, and cloud deployments.

PUBLISHED Reserved 2025-12-08 | Published 2026-03-15 | Updated 2026-03-17 | Assigner @huntr_ai




HIGH: 7.5CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

Problem types

CWE-94 Improper Control of Generation of Code

Product status

Any version
affected

References

huntr.com/bounties/229cd526-41aa-4819-b6f0-e2d0371c89e3

cve.org (CVE-2025-14287)

nvd.nist.gov (CVE-2025-14287)

Download JSON