GHSA-m49c-5c52-6696
GitHub Security Advisory
mlflow vulnerable to Path Traversal
✓ GitHub Reviewed
HIGH
Has CVE
Advisory Details
A path traversal vulnerability exists in the mlflow/mlflow repository, specifically within the handling of the `artifact_location` parameter when creating an experiment. Attackers can exploit this vulnerability by using a fragment component `#` in the artifact location URI to read arbitrary files on the server in the context of the server's process. This issue is similar to CVE-2023-6909 but utilizes a different component of the URI to achieve the same effect.
Affected Packages
PyPI
mlflow
Affected versions:
0
(last affected: 2.9.2)
Related CVEs
Key Information
7.5
/10
Dataset
Last updated: September 10, 2025 6:31 AM
Data from GitHub Advisory Database. This information is provided for research and educational purposes.