Skip to content

Commit 1018b8a

Browse files
1 parent 74b64c2 commit 1018b8a

File tree

1 file changed

+33
-4
lines changed

1 file changed

+33
-4
lines changed

advisories/unreviewed/2025/10/GHSA-5cvj-7rg6-jggj/GHSA-5cvj-7rg6-jggj.json renamed to advisories/github-reviewed/2025/10/GHSA-5cvj-7rg6-jggj/GHSA-5cvj-7rg6-jggj.json

Lines changed: 33 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,40 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-5cvj-7rg6-jggj",
4-
"modified": "2025-10-29T21:30:33Z",
4+
"modified": "2025-11-05T16:12:40Z",
55
"published": "2025-10-29T21:30:33Z",
66
"aliases": [
77
"CVE-2025-11201"
88
],
9+
"summary": "MLflow Tracking Server Model Creation Directory Traversal Remote Code Execution Vulnerability",
910
"details": "MLflow Tracking Server Model Creation Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of MLflow Tracking Server. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of model file paths. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-26921.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "PyPI",
21+
"name": "mlflow"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "3.0.0"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
@@ -23,6 +44,14 @@
2344
"type": "WEB",
2445
"url": "https://github.com/B-Step62/mlflow/commit/2e02bc7bb70df243e6eb792689d9b8eba0013161"
2546
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/mlflow/mlflow/commit/e7dc0574fa3459e0003cfeb68d4e4a625491f03d"
50+
},
51+
{
52+
"type": "PACKAGE",
53+
"url": "https://github.com/mlflow/mlflow"
54+
},
2655
{
2756
"type": "WEB",
2857
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-931"
@@ -33,8 +62,8 @@
3362
"CWE-22"
3463
],
3564
"severity": "HIGH",
36-
"github_reviewed": false,
37-
"github_reviewed_at": null,
65+
"github_reviewed": true,
66+
"github_reviewed_at": "2025-11-05T16:12:40Z",
3867
"nvd_published_at": "2025-10-29T20:15:35Z"
3968
}
4069
}

0 commit comments

Comments
 (0)