Home

Description

A Server-Side Request Forgery (SSRF) vulnerability exists in MLflow versions prior to 3.9.0. The `_create_webhook()` function in `mlflow/server/handlers.py` accepts a user-controlled `url` parameter without validation, and the `_send_webhook_request()` function in `mlflow/webhooks/delivery.py` sends HTTP POST requests to this attacker-controlled URL. This allows an authenticated attacker to force the MLflow backend to send HTTP requests to internal services, cloud metadata endpoints, or arbitrary external servers. The lack of input sanitization, URL scheme filtering, or allowlist validation on the webhook URL enables exploitation, potentially leading to cloud credential theft, internal network access, and data exfiltration.

PUBLISHED Reserved 2026-02-12 | Published 2026-05-11 | Updated 2026-05-11 | Assigner @huntr_ai




HIGH: 7.1CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N

Problem types

CWE-918 Server-Side Request Forgery (SSRF)

Product status

Any version before 3.10.0
affected

References

huntr.com/bounties/04ef100d-06b5-4a70-95b1-b7be23aa8150 exploit

huntr.com/bounties/04ef100d-06b5-4a70-95b1-b7be23aa8150

github.com/...ommit/64aa0ab7207f9c649b59ba1a5f40d82196817389

cve.org (CVE-2026-2393)

nvd.nist.gov (CVE-2026-2393)

Download JSON