Vulnerability Description
A vulnerability in MLflow's pyfunc extraction process allows for arbitrary file writes due to improper handling of tar archive entries. Specifically, the use of `tarfile.extractall` without path validation enables crafted tar.gz files containing `..` or absolute paths to escape the intended extraction directory. This issue affects the latest version of MLflow and poses a high/critical risk in scenarios involving multi-tenant environments or ingestion of untrusted artifacts, as it can lead to arbitrary file overwrites and potential remote code execution.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Lfprojects | Mlflow | <= 3.10.1 |
Related Weaknesses (CWE)
References
- https://huntr.com/bounties/09856f77-f968-446f-a930-657d126efe4eExploitThird Party AdvisoryMitigation
- https://huntr.com/bounties/09856f77-f968-446f-a930-657d126efe4eExploitThird Party AdvisoryMitigation
FAQ
What is CVE-2025-15031?
CVE-2025-15031 is a vulnerability with a CVSS score of 9.1 (CRITICAL). A vulnerability in MLflow's pyfunc extraction process allows for arbitrary file writes due to improper handling of tar archive entries. Specifically, the use of `tarfile.extractall` without path valid...
How severe is CVE-2025-15031?
CVE-2025-15031 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-15031?
Check the references section above for vendor advisories and patch information. Affected products include: Lfprojects Mlflow.