Home

Description

In mlflow/mlflow versions prior to 3.11.0, the `get_or_create_nfs_tmp_dir()` function in `mlflow/utils/file_utils.py` creates temporary directories with world-writable permissions (0o777), and the `_create_model_downloading_tmp_dir()` function in `mlflow/pyfunc/__init__.py` creates directories with group-writable permissions (0o770). These insecure permissions allow local attackers to tamper with model artifacts, such as cloudpickle-serialized Python objects, and achieve arbitrary code execution when the tampered artifacts are deserialized via `cloudpickle.load()`. This vulnerability is particularly critical in environments with shared NFS mounts, such as Databricks, where NFS is enabled by default. The issue is a continuation of the vulnerability class addressed in CVE-2025-10279, which was only partially fixed.

PUBLISHED Reserved 2026-03-13 | Published 2026-05-18 | Updated 2026-05-19 | Assigner @huntr_ai




HIGH: 7.0CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-378 Creation of Temporary File With Insecure Permissions

Product status

Any version before 3.11.0
affected

References

huntr.com/bounties/648dc30b-76c7-4433-86b8-f43d926fd8d6 exploit

huntr.com/bounties/648dc30b-76c7-4433-86b8-f43d926fd8d6

github.com/...ommit/1dcbb0c2fbd1f446c328830e601ca13a28219b8a

cve.org (CVE-2026-4137)

nvd.nist.gov (CVE-2026-4137)

Download JSON