In the latest version of mlflow/mlflow, when the `basic-auth` app is enabled, tracing and assessment endpoints are not protected by permission validators. This allows any authenticated user, including those with `NO_PERMISSIONS` on the experiment, to read trace information and create assessments for traces they should not have access to. This vulnerability impacts confidentiality by exposing trace metadata and integrity by allowing unauthorized creation of assessments. Deployments using `mlflow server --app-name=basic-auth` are affected.
Metrics
Affected Vendors & Products
References
History
Fri, 27 Mar 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In the latest version of mlflow/mlflow, when the `basic-auth` app is enabled, tracing and assessment endpoints are not protected by permission validators. This allows any authenticated user, including those with `NO_PERMISSIONS` on the experiment, to read trace information and create assessments for traces they should not have access to. This vulnerability impacts confidentiality by exposing trace metadata and integrity by allowing unauthorized creation of assessments. Deployments using `mlflow server --app-name=basic-auth` are affected. | |
| Title | Unauthorized Access to Tracing and Assessment Endpoints in mlflow/mlflow | |
| Weaknesses | CWE-200 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2026-03-27T17:00:57.831Z
Reserved: 2025-12-30T21:47:03.954Z
Link: CVE-2025-15381
No data.
Status : Received
Published: 2026-03-27T17:16:26.573
Modified: 2026-03-27T17:16:26.573
Link: CVE-2025-15381
No data.
OpenCVE Enrichment
No data.